Followize Security & Risk Analysis

wordpress.org/plugins/followize

Receba os leads gerados através do seu site diretamente no Followize.

70 active installs v0.7.7 PHP + WP 4.0+ Updated Jul 12, 2023
crmcrm-toolslead-capturelead-collectionlead-management
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Followize Safe to Use in 2026?

Generally Safe

Score 85/100

Followize has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "followize" plugin v0.7.7 exhibits a mixed security posture. On the positive side, it has no known CVEs and utilizes prepared statements for the vast majority of its SQL queries, indicating good database interaction practices. It also avoids dangerous functions and file operations. However, there are notable concerns arising from the static analysis. The plugin has a significant number of unsanitized paths identified in the taint analysis (4 out of 6 flows analyzed), with 3 of these being classified as high severity. This suggests potential vulnerabilities where external input could lead to unintended or malicious behavior within the plugin's execution. Furthermore, while the plugin has a small attack surface with only one shortcode, the overall percentage of properly escaped output (65%) is a concern, as this could lead to cross-site scripting (XSS) vulnerabilities if user-controlled data is displayed without adequate sanitization.

The lack of recorded vulnerability history, while generally positive, doesn't fully mitigate the risks identified in the static analysis. It's possible that these vulnerabilities have simply not been discovered or exploited yet. The absence of capability checks is also a weakness, as it means that functionalities might not be properly restricted to authorized users. In conclusion, while "followize" v0.7.7 demonstrates strengths in database querying and avoids certain risky coding practices, the high number of unsanitized paths and the moderate output escaping rate represent significant security weaknesses that warrant attention.

Key Concerns

  • High severity unsanitized paths in taint analysis
  • Significant number of unsanitized paths
  • Moderate output escaping (65% proper)
  • No capability checks
Vulnerabilities
None known

Followize Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Followize Release Timeline

v0.7.7Current
v0.7.6
v0.7.4
v0.7.3
v0.7.2
v0.7.1
v0.7
v0.6.8
Code Analysis
Analyzed Mar 16, 2026

Followize Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
24 prepared
Unescaped Output
42
77 escaped
Nonce Checks
4
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

96% prepared25 total queries

Output Escaping

65% escaped119 total outputs
Data Flows · Security
4 unsanitized

Data Flow Analysis

6 flows4 with unsanitized paths
search_box (Controller\base\class-wp-list-table.php:325)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Followize Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[followize] Controller\forms.controller.php:19
WordPress Hooks 22
actionadmin_initConfig\core.php:24
actionwp_enqueue_scriptsConfig\core.php:25
actionplugins_loadedConfig\core.php:26
actionadmin_footerController\base\class-wp-list-table.php:138
actionadmin_menuController\forms.controller.php:15
actionadmin_post_fwz_save_formController\forms.controller.php:16
actionadmin_noticesController\forms.controller.php:17
actionadmin_headController\forms.controller.php:18
filterfollowize_field_messageController\forms.controller.php:20
filterfollowize_field_emailOptInController\forms.controller.php:21
filterfollowize_field_nameController\forms.controller.php:22
actionwp_headController\forms.controller.php:23
actionwp_headController\forms.controller.php:24
actionwp_footerController\forms.controller.php:25
actionadmin_headController\forms.controller.php:26
actioninitController\forms.controller.php:27
filterfollowize_field_message_valueController\forms.controller.php:28
actionfollowize_successController\forms.controller.php:29
actionadmin_menuController\settings.controller.php:19
actionadmin_initController\settings.controller.php:20
actionadmin_noticesController\settings.controller.php:22
actionwidgets_initController\widgets.controller.php:14
Maintenance & Trust

Followize Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedJul 12, 2023
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

Followize Developer Profile

Followize

3 plugins · 190 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Followize

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/followize/assets/javascripts/admin/built.js/wp-content/plugins/followize/assets/javascripts/front/built.js
Script Paths
/wp-content/plugins/followize/assets/javascripts/admin/built.js/wp-content/plugins/followize/assets/javascripts/front/built.js
Version Parameters
followize/assets/javascripts/admin/built.js?ver=followize/assets/javascripts/front/built.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Followize