[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fCDrK_eA4ORyrkLXx40WUDIEEa68Krh_4pEuCFCBcrsw":3,"$fEgNDfsp4AhIgS4nhVky3I2_jXRcbFz0dBo_GygyTabo":115,"$fbUZsitCGRP6XOKVqXKSh79T1PPaBDgNIeEIaDqBOC9A":120},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":23,"download_link":24,"security_score":25,"vuln_count":11,"unpatched_count":11,"last_vuln_date":26,"fetched_at":27,"discovery_status":28,"vulnerabilities":29,"developer":30,"crawl_stats":26,"alternatives":39,"analysis":40,"fingerprints":93},"mobile-call-to-action","Mobile Call to Action","1.0","Asadullah Al Galib","https:\u002F\u002Fprofiles.wordpress.org\u002Fgalibri\u002F","\u003Cp>Mobile Call to Action plugin is used to add a custom Call to action button in the footer of your website. It can take 2 actions, one is for phone call and another one is for email button.\u003C\u002Fp>\n","Mobile Call to Action plugin is used to add a custom Call to action button in the footer of your website. It can take 2 actions, one is for phone call &hellip;",0,1693,100,2,"2018-10-23T02:00:00.000Z","4.9.29","4.7","5.6",[4,20,21,22],"mobile-footer-cta","phone-call-to-action","phone-cta","https:\u002F\u002Fgalibweb.com\u002Fplugins\u002Fmobile-call-to-action\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fmobile-call-to-action.zip",85,null,"2026-04-06T09:54:40.288Z","no_bundle",[],{"slug":31,"display_name":32,"profile_url":8,"plugin_count":33,"total_installs":34,"avg_security_score":35,"avg_patch_time_days":36,"trust_score":37,"computed_at":38},"galibri","Galib Riad",3,20,90,30,87,"2026-05-20T08:24:26.307Z",[],{"attackSurface":41,"codeSignals":73,"taintFlows":85,"riskAssessment":86,"analyzedAt":92},{"hooks":42,"ajaxHandlers":69,"restRoutes":70,"shortcodes":71,"cronEvents":72,"entryPointCount":11,"unprotectedCount":11},[43,49,53,57,61,65],{"type":44,"name":45,"callback":46,"file":47,"line":48},"action","plugins_loaded","mcta_load_plugin_textdomain","mobile-call-to-action.php",40,{"type":44,"name":50,"callback":51,"file":47,"line":52},"wp_footer","mcta_add_content_to_site_footer",65,{"type":44,"name":54,"callback":55,"file":47,"line":56},"admin_menu","mcta_add_options_page",80,{"type":44,"name":58,"callback":59,"file":47,"line":60},"admin_init","mcta_save_settings_optoins",149,{"type":44,"name":62,"callback":63,"file":47,"line":64},"wp_enqueue_scripts","mcta_dynamic_stylesheet",179,{"type":44,"name":66,"callback":67,"file":47,"line":68},"admin_enqueue_scripts","mcta_admin_scripts_load",191,[],[],[],[],{"dangerousFunctions":74,"sqlUsage":75,"outputEscaping":77,"fileOperations":11,"externalRequests":11,"nonceChecks":11,"capabilityChecks":11,"bundledLibraries":84},[],{"prepared":11,"raw":11,"locations":76},[],{"escaped":11,"rawEcho":14,"locations":78},[79,82],{"file":47,"line":80,"context":81},55,"raw output",{"file":47,"line":83,"context":81},58,[],[],{"summary":87,"deductions":88},"The mobile-call-to-action plugin version 1.0 exhibits a generally good security posture based on the provided static analysis. The plugin boasts a zero attack surface, meaning it has no exposed AJAX handlers, REST API routes, shortcodes, or cron events that could serve as entry points for attackers. Furthermore, the code analysis reveals no dangerous functions, no direct SQL queries (all are prepared), no file operations, and no external HTTP requests. This suggests a well-contained and defensively coded plugin.\n\nHowever, a significant concern arises from the output escaping. With 100% of outputs not being properly escaped, this presents a substantial risk. Unescaped output is a common vector for Cross-Site Scripting (XSS) vulnerabilities, where attackers could inject malicious scripts into the website, potentially leading to session hijacking, data theft, or defacement. The absence of taint analysis results and known vulnerability history is positive, but it does not negate the concrete risk identified in the output escaping.\n\nIn conclusion, while the plugin demonstrates strong architectural security by minimizing its attack surface and utilizing prepared statements, the lack of output escaping is a critical weakness. This requires immediate attention to prevent potential XSS attacks. The absence of past vulnerabilities is a positive indicator, but the current analysis highlights a clear and present danger that needs to be addressed.",[89],{"reason":90,"points":91},"Unescaped output detected",6,"2026-04-16T13:07:45.928Z",{"wat":94,"direct":104},{"assetPaths":95,"generatorPatterns":99,"scriptPaths":100,"versionParams":101},[96,97,98],"\u002Fwp-content\u002Fplugins\u002Fmobile-call-to-action\u002Fassets\u002Fpublic\u002Fcss\u002Fmcta-style.css","\u002Fwp-content\u002Fplugins\u002Fmobile-call-to-action\u002Fassets\u002Fpublic\u002Fjs\u002Fmcta-main.js","\u002Fwp-content\u002Fplugins\u002Fmobile-call-to-action\u002Fassets\u002Fadmin\u002Fjs\u002Fmcta-admin.js",[],[97,98],[102,103],"mobile-call-to-action\u002Fassets\u002Fpublic\u002Fjs\u002Fmcta-main.js?ver=1.0.0","mobile-call-to-action\u002Fassets\u002Fadmin\u002Fjs\u002Fmcta-admin.js?ver=1.0.0",{"cssClasses":105,"htmlComments":109,"htmlAttributes":110,"restEndpoints":112,"jsGlobals":113,"shortcodeOutput":114},[106,107,108],"mcta-wrapper","mcta-relative","mcta-icons",[],[111],"data-default-color",[],[],[],{"error":116,"url":117,"statusCode":118,"statusMessage":119,"message":119},true,"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fmobile-call-to-action\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":121,"versions":122},1,[123],{"version":6,"download_url":124,"svn_tag_url":125,"released_at":26,"has_diff":126,"diff_files_changed":127,"diff_lines":26,"trac_diff_url":26,"vulnerabilities":128,"is_current":116},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fmobile-call-to-action.1.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fmobile-call-to-action\u002Ftags\u002F1.0\u002F",false,[],[]]