LeadBoxer Security & Risk Analysis

wordpress.org/plugins/leadboxer

This plugin can be used to add the LeadBoxer tracking code to a Wordpress site

100 active installs v1.4 PHP + WP 3.0.1+ Updated Jan 31, 2025
email-trackinglead-generationlead-managementvisitor-identificationwebsite-identification
91
A · Safe
CVEs total1
Unpatched0
Last CVENov 18, 2024
Safety Verdict

Is LeadBoxer Safe to Use in 2026?

Generally Safe

Score 91/100

LeadBoxer has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Nov 18, 2024Updated 1yr ago
Risk Assessment

The leadboxer plugin version 1.4 exhibits a generally positive security posture based on the static analysis, with no identified dangerous functions, file operations, or external HTTP requests. The absence of SQL queries using prepared statements and the high percentage of properly escaped outputs suggest good coding practices in these areas. The plugin also has a clean vulnerability history with no currently unpatched CVEs. However, the static analysis did reveal two flows with unsanitized paths. While the taint analysis did not flag these as critical or high severity, it does indicate a potential area for concern where user-supplied data might not be properly handled before being used in a way that could lead to vulnerabilities if not carefully managed by other layers of defense. The lack of any observed entry points such as AJAX handlers, REST API routes, shortcodes, or cron events is a significant strength, drastically reducing the plugin's attack surface. Despite the minor taint concerns, the overall lack of exploitable entry points and clean vulnerability history make this version appear relatively secure, though diligent monitoring for future updates and thorough testing of any identified taint flows is recommended.

Key Concerns

  • Flows with unsanitized paths detected
  • No nonce checks on entry points
  • No capability checks on entry points
  • Low percentage of properly escaped outputs (86%)
Vulnerabilities
1 published

LeadBoxer Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-52468medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

LeadBoxer <= 1.3 - Reflected Cross-Site Scripting

Nov 18, 2024 Patched in 1.4 (466d)
Version History

LeadBoxer Release Timeline

v1.4Current
v1.31 CVE
v1.21 CVE
v1.11 CVE
v1.01 CVE
Code Analysis
Analyzed Mar 16, 2026

LeadBoxer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

86% escaped7 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
add_settings (leadboxer.class.php:31)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

LeadBoxer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedleadboxer.class.php:78
actionadmin_menuleadboxer.class.php:79
actionwp_enqueue_scriptsleadboxer.class.php:80
Maintenance & Trust

LeadBoxer Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedJan 31, 2025
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

LeadBoxer Developer Profile

LeadBoxer

2 plugins · 100 total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
466 days
View full developer profile
Detection Fingerprints

How We Detect LeadBoxer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
//script.leadboxer.com/

HTML / DOM Fingerprints

CSS Classes
fieldwrapspinner
Data Attributes
spellcheckautocomplete
FAQ

Frequently Asked Questions about LeadBoxer