
Free Live Chat Support Security & Risk Analysis
wordpress.org/plugins/livesupportiFree Live Support Chat for your WordPress website.
Is Free Live Chat Support Safe to Use in 2026?
Generally Safe
Score 99/100Free Live Chat Support has a strong security track record. Known vulnerabilities have been patched promptly.
The static analysis of livesupporti v1.0.12 reveals a generally positive security posture, with no apparent direct attack vectors identified such as AJAX handlers, REST API routes, shortcodes, or cron events without authentication. The code exhibits good practices by using prepared statements for all SQL queries and performing output escaping on a majority of outputs. The absence of file operations and a low number of external HTTP requests also contribute to a more secure codebase. However, there is a single external HTTP request, which, while not inherently a vulnerability, can be a potential entry point if not handled with extreme care and proper validation. The presence of two nonce checks and one capability check suggests some attempt at securing actions, but the limited number, especially with no AJAX handlers, is noteworthy.
The vulnerability history, though, presents a significant concern. A past high-severity vulnerability, specifically Cross-Site Request Forgery (CSRF), was identified and last occurred in June 2022. While currently unpatched, the fact that there are no *currently* unpatched vulnerabilities is a positive sign. However, the historical pattern of a high-severity CSRF vulnerability indicates a potential weakness in how user actions are authenticated or authorized, and the lack of unpatched vulnerabilities could simply mean the plugin hasn't been flagged recently or the vulnerability was fixed in a later version not reflected in this data.
In conclusion, livesupporti v1.0.12 demonstrates strengths in its limited attack surface and secure SQL handling. The primary weakness lies in the historical presence of a high-severity CSRF vulnerability, suggesting a need for vigilance regarding user input validation and authorization, even with the current absence of known unpatched issues. The single external HTTP request warrants further investigation for secure implementation.
Key Concerns
- Historical high-severity vulnerability (CSRF)
- External HTTP request without explicit analysis
- Low number of capability checks relative to potential actions
Free Live Chat Support Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Free Live Chat Support <= 1.0.11 - Cross-Site Request Forgery to Cross-Site Scripting
Free Live Chat Support Code Analysis
Output Escaping
Data Flow Analysis
Free Live Chat Support Attack Surface
WordPress Hooks 3
Maintenance & Trust
Free Live Chat Support Maintenance & Trust
Maintenance Signals
Community Trust
Free Live Chat Support Alternatives
Tidio – Live Chat & AI Chatbots
tidio-live-chat
Add Tidio Live Chat to your WordPress for free to answer customers’ questions, engage website visitors, generate leads, and increase sales.
Crisp – Live Chat and Chatbot
crisp
A Free, one-click-to-install, Live Chat and chatbot plugin. No coding skills are required. Used by more than 30 000 customers on WordPress.
Charla Live Chat
charla-live-chat
Add Charla Live Chat Widget to your site without writing a single line of code. Compatible with all themes.
Support Board Cloud
support-board-cloud
A Free one-click-to-install Live Chat plugin. No coding skills required. Used by more than 2000 customers on WordPress.
SaleSmartly – Live Chat & Chat Bot Integrate
salesmartly-chat
Smart Sales Human service for your customers
Free Live Chat Support Developer Profile
1 plugin · 700 total installs
How We Detect Free Live Chat Support
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/livesupporti/wordpress-bg.png/wp-content/plugins/livesupporti/logo.pngHTML / DOM Fingerprints
<!-- Live chat by LiveSupporti - https://livesupporti.com -->id="form1"name="form1"id="txtEmail"name="txtEmail"id="txtPassword"name="txtPassword"+3 more