Mobile Contact Buttons Security & Risk Analysis

wordpress.org/plugins/mobile-contact-buttons

Adds Call, Email and SMS buttons on bottom of website. Only for Mobile View of website.

100 active installs v1.3 PHP 5.2.4+ WP 4.6+ Updated Sep 8, 2018
callcall-buttonemail-buttonmobile-contact-buttonstext
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Mobile Contact Buttons Safe to Use in 2026?

Generally Safe

Score 85/100

Mobile Contact Buttons has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "mobile-contact-buttons" plugin version 1.3 exhibits a generally positive security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests is a strong indicator of good security practices. The plugin also utilizes prepared statements for all SQL queries, which mitigates the risk of SQL injection vulnerabilities.

However, a significant concern arises from the output escaping. With 100% of outputs not being properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed by the plugin, if not inherently safe, could be exploited by attackers to inject malicious scripts into users' browsers. The lack of nonce and capability checks, while not directly leading to an attack surface given the current analysis, could become a weakness if new entry points are introduced in future versions without proper authorization controls.

The vulnerability history is also a positive sign, showing no known CVEs. This suggests a history of stable and secure development. In conclusion, while the plugin demonstrates a strong foundation in preventing common web vulnerabilities like SQL injection and has a clean vulnerability record, the pervasive issue of unescaped output represents a critical oversight that must be addressed to ensure user security.

Key Concerns

  • All outputs are unescaped
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Mobile Contact Buttons Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Mobile Contact Buttons Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

Mobile Contact Buttons Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_enqueue_scriptsmobile-contact-buttons.php:22
actioncustomize_registermobile-contact-buttons.php:107
actionwp_footermobile-contact-buttons.php:169
Maintenance & Trust

Mobile Contact Buttons Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedSep 8, 2018
PHP min version5.2.4
Downloads2K

Community Trust

Rating100/100
Number of ratings3
Active installs100
Developer Profile

Mobile Contact Buttons Developer Profile

tanja111

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mobile Contact Buttons

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mobile-contact-buttons/css/cubm-style.css
Version Parameters
mobile-contact-buttons/css/cubm-style.css?ver=

HTML / DOM Fingerprints

CSS Classes
mobile_contact_buttons_callmobile_contact_buttons_emailmobile_contact_buttons_smsmobile_contact_buttons_call2mobile_contact_buttons_email2
Data Attributes
id="mobile_contact_buttons_container"id="mobile_contact_buttons"id="mobile_contact_buttons2"
FAQ

Frequently Asked Questions about Mobile Contact Buttons