Customer Referral Program | Refer a Friend Software Security & Risk Analysis

wordpress.org/plugins/invitereferrals-customer-referral-program

Design and launch customer referral campaigns within minutes in Wordpress.

80 active installs v2.3 PHP + WP 3.0+ Updated Jan 30, 2025
contestcustomer-referral-campaignrefer-a-friendreferralreferral-program
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Customer Referral Program | Refer a Friend Software Safe to Use in 2026?

Generally Safe

Score 92/100

Customer Referral Program | Refer a Friend Software has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The static analysis of the "invitereferrals-customer-referral-program" v2.3 plugin reveals a generally good security posture in terms of its attack surface. The absence of AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points is a significant strength. Furthermore, the code's adherence to prepared statements for all SQL queries and the lack of dangerous functions or external HTTP requests indicate a conscientious development approach. The vulnerability history being clean also suggests a well-maintained plugin with no previously disclosed security flaws.

However, a critical concern arises from the output escaping analysis. With 15 total outputs and 0% properly escaped, this presents a high risk of cross-site scripting (XSS) vulnerabilities. Any user-supplied data that is displayed back to the user without proper sanitization can be exploited by attackers to inject malicious scripts. While the plugin has only one capability check, the lack of output escaping is a severe oversight that could lead to significant security breaches. The absence of taint analysis results and the limited number of code signals examined also mean that deeper vulnerabilities might remain undetected by this specific analysis.

Key Concerns

  • All outputs are unescaped
Vulnerabilities
None known

Customer Referral Program | Refer a Friend Software Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Customer Referral Program | Refer a Friend Software Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped15 total outputs
Attack Surface

Customer Referral Program | Refer a Friend Software Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_footerinvitereferrals.php:93
actionadmin_initinvitereferrals.php:97
actionadmin_menuinvitereferrals.php:99
Maintenance & Trust

Customer Referral Program | Refer a Friend Software Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedJan 30, 2025
PHP min version
Downloads21K

Community Trust

Rating86/100
Number of ratings24
Active installs80
Developer Profile

Customer Referral Program | Refer a Friend Software Developer Profile

tagNpin - Site engagement softwares

3 plugins · 100 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Customer Referral Program | Refer a Friend Software

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/invitereferrals-customer-referral-program/invitereferrals_opt.php
Script Paths
//cdn.invitereferrals.com/js/invite-referrals-1.0.js
Version Parameters
invitereferrals-customer-referral-program/invitereferrals.php?ver=

HTML / DOM Fingerprints

CSS Classes
invitereferrals_widget
Data Attributes
data-biddata-sso_keydata-rtdata-emaildata-userParamsdata-fname
JS Globals
invite_referralsir
Shortcode Output
<div id='invtrflfloatbtn'></div>
FAQ

Frequently Asked Questions about Customer Referral Program | Refer a Friend Software