Indemandly Security & Risk Analysis

wordpress.org/plugins/indemandly

Indemandly is a powerful marketing and scheduling tool that will supercharge your website & social media - convert customers fast with messaging, …

10 active installs v1.0.3 PHP + WP 2.6+ Updated Jun 29, 2018
customer-servicelead-generatormailing-listonline-bookingscheduling
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Indemandly Safe to Use in 2026?

Generally Safe

Score 85/100

Indemandly has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The Indemandly plugin v1.0.3 exhibits a generally strong security posture based on the provided static analysis. The absence of direct entry points like AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the code shows no dangerous functions, no file operations, no external HTTP requests, and all SQL queries utilize prepared statements, indicating good coding practices in these critical areas. The presence of a nonce check also suggests an attempt to protect against CSRF attacks, though the lack of capability checks is a notable omission.

However, a significant concern arises from the output escaping results, where 100% of the total outputs are not properly escaped. This presents a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website. The taint analysis showing zero flows is positive but doesn't negate the identified output escaping issue. The plugin's history of zero known CVEs is reassuring, implying a good track record, but this should not overshadow the critical XSS risk identified in the current version's code.

In conclusion, while Indemandly v1.0.3 demonstrates good practices in preventing SQL injection and limiting direct entry points, the complete lack of output escaping creates a critical vulnerability. The absence of capability checks is another area for improvement. Users should be aware of the significant XSS risk and consider whether the benefits of the plugin outweigh this security flaw, or if the developer addresses the output escaping issue promptly.

Key Concerns

  • Unescaped output (100%)
  • Missing capability checks
Vulnerabilities
None known

Indemandly Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Indemandly Release Timeline

v1.0.3Current
v1.0.2
v1.0.1
v1.0
Code Analysis
Analyzed Mar 16, 2026

Indemandly Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped8 total outputs
Attack Surface

Indemandly Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_headwp-indemandly-add.php:39
actionwp_enqueue_scriptswp-indemandly-add.php:46
actionadmin_menuwp-indemandly-options.php:10
Maintenance & Trust

Indemandly Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJun 29, 2018
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

Indemandly Developer Profile

cavin smith

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Indemandly

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
Indemandly
FAQ

Frequently Asked Questions about Indemandly