Live Support Security & Risk Analysis

wordpress.org/plugins/live-support

Adds call button to your site. Your vistors can make web calls right away from your site.

10 active installs v1.0 PHP + WP 3.0.+ Updated Nov 22, 2012
call-pluginlive-call-supportlive-supportlive-voice-supportvoice-suport
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Live Support Safe to Use in 2026?

Generally Safe

Score 85/100

Live Support has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The live-support plugin v1.0 presents a mixed security posture. On the positive side, the static analysis reveals no known dangerous functions, no direct SQL queries (all using prepared statements), no file operations, and no external HTTP requests. The absence of any recorded CVEs and the lack of any taint analysis flows with unsanitized paths are also strong indicators of good development practices regarding common web vulnerabilities.

However, significant concerns arise from the complete lack of output escaping for all identified output points. This means that any data processed and displayed by the plugin could potentially be rendered as code in the user's browser, leading to Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the absence of any nonce checks or capability checks for any entry points suggests a potential for unauthorized actions if any vulnerabilities were to be discovered in the future, as there are no built-in defenses against CSRF or privilege escalation within the plugin's code itself. The lack of an attack surface is a positive, but the lack of security mechanisms on the zero entry points is a weakness.

Given the complete absence of vulnerability history, it's difficult to draw conclusions from past patterns. The plugin appears to have been developed with some security awareness, particularly in avoiding direct SQL queries. However, the critical oversight in output escaping and the lack of authorization checks on its limited entry points create a significant risk that needs immediate attention. The plugin's strengths are overshadowed by its critical weaknesses in output sanitization and access control.

Key Concerns

  • All output is unescaped
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Live Support Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Live Support Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

Live Support Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_footerlive-support.php:40
actionadmin_menuplugin_interface.php:2
actionadmin_initplugin_interface.php:6
Maintenance & Trust

Live Support Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedNov 22, 2012
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Live Support Developer Profile

Jacquish

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Live Support

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/live-support/css/live-support.css

HTML / DOM Fingerprints

CSS Classes
calltosupport_btn
JS Globals
myWindow
FAQ

Frequently Asked Questions about Live Support