
Meeting List Lite Security & Risk Analysis
wordpress.org/plugins/meeting-list-liteThis is a WordPress plugin for displaying 12-Step Meeting Information.
Is Meeting List Lite Safe to Use in 2026?
Generally Safe
Score 100/100Meeting List Lite has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'meeting-list-lite' plugin version 1.2.4 demonstrates a generally good security posture with a limited attack surface and strong adherence to secure coding practices in several key areas. The absence of known CVEs, unpatched vulnerabilities, and critical taint flows is a positive indicator of its historical security. Furthermore, the plugin utilizes prepared statements for all SQL queries and properly escapes a high percentage of its output, minimizing the risk of SQL injection and cross-site scripting (XSS) vulnerabilities stemming from data handling and display.
However, there are areas that warrant attention. The presence of the 'preg_replace' function with the 'e' modifier, while not necessarily a vulnerability in itself, is a well-known source of potential code injection vulnerabilities if user-supplied data is used in the replacement pattern without proper sanitization. Coupled with the absence of nonce checks and capability checks on its single shortcode entry point, this could potentially be exploited under specific circumstances. While no direct vulnerabilities are indicated by the static analysis or historical data, the lack of robust authentication and authorization checks on the identified entry point, combined with the presence of a potentially dangerous function, represents a theoretical risk that should be mitigated.
In conclusion, 'meeting-list-lite' v1.2.4 has a solid foundation of secure coding. Its lack of historical vulnerabilities is reassuring. The primary concern lies in the potential for the 'preg_replace' function to be misused due to the absence of authorization checks on the shortcode. Addressing this by implementing proper sanitization and capability checks on the shortcode would significantly enhance the plugin's security.
Key Concerns
- Dangerous function: preg_replace(/e)
- Missing nonce checks on entry points
- Missing capability checks on entry points
Meeting List Lite Security Vulnerabilities
Meeting List Lite Code Analysis
Dangerous Functions Found
Output Escaping
Meeting List Lite Attack Surface
Shortcodes 1
WordPress Hooks 5
Maintenance & Trust
Meeting List Lite Maintenance & Trust
Maintenance Signals
Community Trust
Meeting List Lite Alternatives
crouton
crouton
crouton provides a UI and more for view recovery meetings as stored in a Basic Meeting List Toolbox (BMLT) database.
NACC WordPress Plugin
nacc-wordpress-plugin
This is a WordPress plugin implementation of the N.A. Cleantime Calculator.
Cart Abandonment Recovery for WooCommerce – Recover Lost Sales with Automated Emails
woo-cart-abandonment-recovery
Every store loses sales to cart abandonment. But with Cart Abandonment Recovery for WooCommerce, you can win them back—automatically.
Booster for WooCommerce – PDF Invoices, Abandoned Cart, Variation Swatches & 100+ Tools
woocommerce-jetpack
Supercharge WooCommerce with FREE Abandoned Cart Recovery, Product Variation Swatches, PDF Invoices & 100+ tools. Boost sales & save time.
Abandoned Cart Lite for WooCommerce
woocommerce-abandoned-cart
Track abandoned carts and send automated, customizable abandoned cart recovery emails. Reduce cart abandonment, recover lost revenue & increase sales.
Meeting List Lite Developer Profile
10 plugins · 370 total installs
How We Detect Meeting List Lite
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/meeting-list-lite/style.csshttps://tsml-ui.code4recovery.org/app.jsmeeting-list-lite/style.css?ver=HTML / DOM Fingerprints
meetinglistlite-fullwidthdata-timezonedata-googledata-pathdata-src<div class="meetinglistlite-fullwidth">
<div id="tsml-ui"</div>
</div>