Lucep Call Now Button Security & Risk Analysis

wordpress.org/plugins/lucep-call-now-button

An award winning "call now" (or click to call) widget that works on all of your pages! Proven to increase sales by over 72% and it's fr …

10 active installs v1.0.3 PHP + WP 3.3+ Updated Aug 4, 2017
callcontactcustomerssalessell
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Lucep Call Now Button Safe to Use in 2026?

Generally Safe

Score 85/100

Lucep Call Now Button has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'lucep-call-now-button' plugin version 1.0.3 exhibits a generally positive security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events without proper authorization checks is a significant strength, indicating a minimal attack surface. Furthermore, the complete reliance on prepared statements for all SQL queries is excellent practice, mitigating SQL injection risks. However, there are areas for improvement. The taint analysis reveals two flows with unsanitized paths, which, while not classified as critical or high severity in this analysis, represent potential security blind spots that could be exploited if new vulnerabilities are discovered or if the classification thresholds are adjusted. Additionally, the output escaping is only 63% proper, suggesting that some user-supplied data might be rendered without adequate sanitization, potentially leading to cross-site scripting (XSS) vulnerabilities. The plugin's vulnerability history is clean, with no recorded CVEs, which is a strong indicator of good historical security management.

Key Concerns

  • Taint flows with unsanitized paths identified
  • Output escaping only 63% proper
  • No capability checks implemented
  • No nonce checks implemented
Vulnerabilities
None known

Lucep Call Now Button Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Lucep Call Now Button Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

63% escaped8 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
lucep_plugin_settings_page (lucep.php:29)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Lucep Call Now Button Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menulucep.php:14
actionadmin_initlucep.php:20
actionwp_footerlucep.php:202
actionadmin_noticeslucep.php:206
Maintenance & Trust

Lucep Call Now Button Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedAug 4, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Lucep Call Now Button Developer Profile

lucep

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Lucep Call Now Button

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/lucep-call-now-button/css/admin_style.css
Version Parameters
lucep-call-now-button/css/admin_style.css?ver=

HTML / DOM Fingerprints

CSS Classes
lucep_admin_wrap
FAQ

Frequently Asked Questions about Lucep Call Now Button