Video Call Button by Gruveo Security & Risk Analysis

wordpress.org/plugins/gruveo-call-button

Let your website visitors call you with voice and video using the Gruveo button. No account or installs are needed for callers!

10 active installs v1.3 PHP + WP 4.7+ Updated Mar 16, 2021
callscreen-sharingvideovideo-conferencingvoice
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Video Call Button by Gruveo Safe to Use in 2026?

Generally Safe

Score 85/100

Video Call Button by Gruveo has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The gruveo-call-button plugin v1.3 presents a generally good security posture with some notable areas for concern. The absence of known CVEs and the plugin's limited attack surface, with no unprotected entry points identified in the static analysis, are positive indicators. Furthermore, the plugin demonstrates good practice by exclusively using prepared statements for its SQL queries and avoiding file operations and external HTTP requests, which are common vectors for vulnerabilities.

However, the static analysis reveals a significant weakness in output escaping, with only 40% of outputs being properly escaped. This indicates a potential for cross-site scripting (XSS) vulnerabilities, especially if user-supplied data is not handled carefully before being displayed. The lack of nonce checks and capability checks on the identified entry points (though the number of entry points is small) is also a concern, as it could allow unauthorized actions if an attacker can trigger these functions. The absence of any taint analysis results, while potentially meaning no critical issues were found, could also suggest that the analysis was incomplete or not sufficiently deep to uncover subtle taint flows.

Overall, while the plugin benefits from a clean vulnerability history and good handling of database interactions, the insufficient output escaping and the absence of robust authorization checks on its limited entry points represent the primary security risks. Addressing these areas would significantly strengthen the plugin's security.

Key Concerns

  • Low output escaping percentage
  • No capability checks on entry points
  • No nonce checks on entry points
Vulnerabilities
None known

Video Call Button by Gruveo Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Video Call Button by Gruveo Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
21
14 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

40% escaped35 total outputs
Attack Surface

Video Call Button by Gruveo Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[gruveo-button] modules\shortcodes.php:2
WordPress Hooks 3
actionwp_footermodules\hooks.php:3
actionwp_print_scriptsmodules\scripts.php:3
actionwidgets_initmodules\widgets.php:129
Maintenance & Trust

Video Call Button by Gruveo Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedMar 16, 2021
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Video Call Button by Gruveo Developer Profile

artmatsak

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Video Call Button by Gruveo

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gruveo-call-button/css/admin.css

HTML / DOM Fingerprints

Shortcode Output
[gruveo-button handle='handle_value' size='size_value' type='type_value' language='language_value']
FAQ

Frequently Asked Questions about Video Call Button by Gruveo