Love Calculator Security & Risk Analysis

wordpress.org/plugins/love-calculator

This love calculator evaluates the compatibility of two people based on names.

10 active installs v1.2 PHP + WP 2.5+ Updated Jul 11, 2017
lovelove-calculatorrelationshipwidgetwidgets
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Love Calculator Safe to Use in 2026?

Generally Safe

Score 85/100

Love Calculator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'love-calculator' plugin v1.2 exhibits a generally strong security posture based on the provided static analysis. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events with exploitable attack surfaces is a significant strength. Furthermore, the code does not appear to utilize dangerous functions, perform file operations, or make external HTTP requests, all of which are positive security indicators. The 100% usage of prepared statements for SQL queries is commendable, mitigating the risk of SQL injection vulnerabilities.

However, a critical concern arises from the complete lack of output escaping. With 3 total outputs analyzed and 0% properly escaped, this indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users, especially if it originates from user input or external sources, could be exploited to inject malicious scripts. The absence of nonce checks and capability checks, particularly in conjunction with the potential for XSS, further exacerbates this risk, as there are no built-in mechanisms to verify user intent or permissions for actions that might lead to output.

The plugin's vulnerability history is currently clean, with no recorded CVEs. This suggests a good track record in the past, but it does not negate the immediate risks identified in the static analysis. The lack of any identified taint flows is also a positive sign, but again, this is overshadowed by the severe output escaping deficiency. In conclusion, while the plugin avoids many common pitfalls, the severe lack of output escaping presents a significant and immediate security risk that needs to be addressed.

Key Concerns

  • Output escaping missing
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Love Calculator Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Love Calculator Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Love Calculator Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initlove-calculator-wp-widget.php:175
Maintenance & Trust

Love Calculator Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJul 11, 2017
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Love Calculator Developer Profile

genpichong

3 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Love Calculator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
calculatornet_love_calculator
HTML Comments
Edit the following to change the look and feel of this calculator
Data Attributes
id="calinputtablelove"id="cnameone"id="cnametwo"
JS Globals
gObjtrimAllshowquicklovemsggetNumlovecalc
Shortcode Output
[calculatornet_love_calculator]
FAQ

Frequently Asked Questions about Love Calculator