Liveforce Security & Risk Analysis

wordpress.org/plugins/liveforce

No coding required! Effortlessly integrate the Liveforce live chat widget into your WordPress site with just a few clicks.

0 active installs v1.0 PHP 7.1+ WP 5.8+ Updated Nov 28, 2024
exit-popuplive-chatsms
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Liveforce Safe to Use in 2026?

Generally Safe

Score 92/100

Liveforce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "liveforce" plugin v1.0 exhibits a generally good security posture based on the static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points is a significant strength, drastically reducing the potential attack surface. The code also demonstrates strong practices regarding SQL queries, exclusively using prepared statements, and a high percentage of properly escaped output. The presence of nonce checks and the single external HTTP request with a good output escaping rate are also positive indicators.

However, a potential concern arises from the taint analysis, which identified one flow with unsanitized paths. While no critical or high severity issues were flagged in this flow, it warrants attention as it represents a potential avenue for unexpected behavior or vulnerability if the data involved were to be handled insecurely. The lack of capability checks is another area for improvement, as it means that access to plugin functionalities might not be properly restricted based on user roles.

Despite the single unsanitized path flow, the plugin's vulnerability history is clean, with no recorded CVEs. This suggests a developer who is either proactive in security or has not yet encountered exploitable vulnerabilities. In conclusion, "liveforce" v1.0 is strong in its limited attack surface and secure coding practices for database operations and output handling. The primary weakness lies in the single identified unsanitized path flow and the absence of capability checks, which, while not currently leading to known vulnerabilities, represent areas where security could be further hardened.

Key Concerns

  • Taint flow with unsanitized path
  • Missing capability checks
Vulnerabilities
None known

Liveforce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Liveforce Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Liveforce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
28 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

97% escaped29 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<liveforce.inc> (liveforce.inc.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Liveforce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menuliveforce.inc.php:16
actionadmin_enqueue_scriptsliveforce.inc.php:17
actionwp_footerliveforce.inc.php:18
actionadmin_noticesliveforce.inc.php:19
actionadmin_noticesliveforce.inc.php:97
Maintenance & Trust

Liveforce Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 28, 2024
PHP min version7.1
Downloads374

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Liveforce Developer Profile

theliveforce

1 plugin · 0 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Liveforce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/liveforce/assets/css/style.css
Version Parameters
lcfwp-stylelf-widget

HTML / DOM Fingerprints

JS Globals
LCFWP
FAQ

Frequently Asked Questions about Liveforce