PGreca Chat Security & Risk Analysis

wordpress.org/plugins/pgreca-chat

Live Chat Plugin for Wordpress Websites. 100% FREE.

0 active installs v0.8 PHP + WP 4.5+ Updated Jun 12, 2017
chatchat-pluginprivate-chatshoutboxwordpress-live-chat
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PGreca Chat Safe to Use in 2026?

Generally Safe

Score 85/100

PGreca Chat has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The pgreca-chat plugin version 0.8 presents a significant security risk primarily due to its unprotected AJAX handlers. With 8 AJAX handlers and none of them implementing authentication checks, any unauthenticated user can potentially trigger these functions, leading to a broad attack surface. The taint analysis revealing 3 flows with unsanitized paths, including 2 of high severity, further exacerbates this concern. These flows suggest that user-supplied data might be processed in a way that could lead to vulnerabilities like cross-site scripting (XSS) or other injection attacks, especially when combined with the unprotected AJAX endpoints.

The plugin's vulnerability history is clean, with no recorded CVEs. This is a positive indicator, suggesting the developers may have good security practices or that the plugin has not yet been widely targeted or extensively audited. However, the lack of historical vulnerabilities should not overshadow the critical issues identified in the static analysis. The absence of nonce checks and a concerningly low percentage of capability checks (only 1 out of 8 entry points) indicate a fundamental lack of robust security controls for its entry points. While the use of prepared statements for SQL queries is commendable, the presence of unsanitized paths and unprotected AJAX handlers creates a high-risk environment.

Key Concerns

  • Unprotected AJAX handlers (8)
  • High severity taint flows (2)
  • Unsanitized paths in taint flows (3)
  • Lack of nonce checks
  • Low capability checks coverage
Vulnerabilities
None known

PGreca Chat Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

PGreca Chat Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
9 prepared
Unescaped Output
25
44 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

75% prepared12 total queries

Output Escaping

64% escaped69 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
pgreca_chat_ajax_chat_new (pgreca-chat_functions.php:182)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
8 unprotected

PGreca Chat Attack Surface

Entry Points8
Unprotected8

AJAX Handlers 8

authwp_ajax_pgreca_chat_ajax_messagepgreca-chat.php:88
noprivwp_ajax_pgreca_chat_ajax_messagepgreca-chat.php:89
authwp_ajax_pgreca_chat_ajax_memberonlinepgreca-chat.php:91
noprivwp_ajax_pgreca_chat_ajax_memberonlinepgreca-chat.php:92
authwp_ajax_pgreca_chat_ajax_chat_newpgreca-chat.php:95
authwp_ajax_pgreca_chat_ajax_newchatpgreca-chat.php:96
authwp_ajax_pgreca_chat_ajax_sendpgreca-chat.php:98
authwp_ajax_pgreca_chat_ajax_user_settingspgreca-chat.php:99
WordPress Hooks 7
actionplugins_loadedpgreca-chat.php:42
actionplugins_loadedpgreca-chat.php:60
actioninitpgreca-chat.php:65
actionadmin_menupgreca-chat.php:80
actionadmin_initpgreca-chat.php:85
actionwp_footerpgreca-chat.php:101
filterbp_before_member_header_metapgreca-chat_integrate.php:2
Maintenance & Trust

PGreca Chat Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJun 12, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

PGreca Chat Developer Profile

pgreca

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PGreca Chat

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pgreca-chat/pgreca-chat.css/wp-content/plugins/pgreca-chat/pgreca-chat_admin.css/wp-content/plugins/pgreca-chat/images/icon.png
Script Paths
/wp-content/plugins/pgreca-chat/pgreca-chat.js
Version Parameters
pgreca-chat.css?ver=pgreca-chat.js?ver=

HTML / DOM Fingerprints

CSS Classes
pgreca_chat_chatpgreca_chat-headpgreca_chat-widget_showpgreca_chat-memberonlinepgreca_chat-widget_gadgetpgreca_chat-widget_emoticonpgreca_chat-widget_settingspgreca_chat_widget_emoticon_panel+6 more
Data Attributes
data-chat_memberdata-emoticon
JS Globals
pgrecachat_ajax
REST Endpoints
/wp-json/pgreca-chat/v1/messages/wp-json/pgreca-chat/v1/member-online/wp-json/pgreca-chat/v1/chat-new/wp-json/pgreca-chat/v1/new-chat/wp-json/pgreca-chat/v1/send/wp-json/pgreca-chat/v1/user-settings
FAQ

Frequently Asked Questions about PGreca Chat