LivePerson LiveChat + Messaging Security & Risk Analysis

wordpress.org/plugins/liveperson

LivePerson offers a modern way to engage visitors from desktop and mobile. It's fast and simple and connects you in real time.

40 active installs v1.0.1 PHP + WP 4.4.2+ Updated Aug 2, 2016
chatchat-plugincustomer-helpcustomer-service-chatcustomer-service-software
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is LivePerson LiveChat + Messaging Safe to Use in 2026?

Generally Safe

Score 85/100

LivePerson LiveChat + Messaging has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "liveperson" plugin v1.0.1 exhibits a strong security posture based on the provided static analysis, with no identified attack surface points, dangerous functions, or external HTTP requests. The code demonstrates good practices by exclusively using prepared statements for SQL queries, indicating a low risk of SQL injection vulnerabilities. Furthermore, the absence of any recorded vulnerabilities in its history suggests a well-maintained and secure codebase.

However, a significant concern arises from the complete lack of output escaping. With 9 total outputs and 0% properly escaped, this plugin presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that originates from user input or external sources is susceptible to malicious injection. Additionally, the absence of nonce and capability checks on potential entry points, while currently showing zero, leaves the plugin vulnerable if its attack surface were to expand or if undocumented entry points exist.

In conclusion, while the plugin excels in its handling of database interactions and has a clean vulnerability history, the critical oversight in output escaping poses a severe risk. The lack of authentication checks, though not currently exploitable due to a zero attack surface, is a potential weakness that requires attention should the plugin evolve. Prioritizing the implementation of output escaping mechanisms is paramount to mitigating the immediate XSS risks.

Key Concerns

  • 0% output escaping for 9 outputs
  • 0 nonces checks
  • 0 capability checks
Vulnerabilities
None known

LivePerson LiveChat + Messaging Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

LivePerson LiveChat + Messaging Release Timeline

v1.0.1Current
v1.0.0
Code Analysis
Analyzed Mar 16, 2026

LivePerson LiveChat + Messaging Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped9 total outputs
Attack Surface

LivePerson LiveChat + Messaging Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuliveperson.php:19
actionadmin_initliveperson.php:20
actionwp_footerliveperson.php:21
Maintenance & Trust

LivePerson LiveChat + Messaging Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedAug 2, 2016
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings3
Active installs40
Developer Profile

LivePerson LiveChat + Messaging Developer Profile

liveperson

1 plugin · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect LivePerson LiveChat + Messaging

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/liveperson/css//wp-content/plugins/liveperson/js/

HTML / DOM Fingerprints

CSS Classes
form-item-checkbox
Data Attributes
name="liveperson_settings[liveperson_account_number]"name="liveperson_settings[liveperson_role_visibility]name="liveperson_settings[liveperson_post_visibility]name="liveperson_settings[liveperson_path_visibility]"
FAQ

Frequently Asked Questions about LivePerson LiveChat + Messaging