
Poll Lite Security & Risk Analysis
wordpress.org/plugins/poll-liteAllows to add polls to your site
Is Poll Lite Safe to Use in 2026?
Generally Safe
Score 85/100Poll Lite has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The poll-lite plugin v1.0.1 presents a mixed security posture. On the positive side, it has no known historical CVEs and a relatively small attack surface with only one shortcode entry point, and no AJAX or REST API handlers with security checks missing. However, the static analysis reveals several significant concerns. The presence of `ini_set` is a red flag as it can be misused to alter PHP configurations, potentially leading to security vulnerabilities. Furthermore, 89% of SQL queries use prepared statements, which is good, but there are still some queries not using this best practice. A critical finding is that 0% of outputs are properly escaped, meaning any dynamic content rendered by the plugin could be vulnerable to Cross-Site Scripting (XSS) attacks. The taint analysis highlights 6 flows with unsanitized paths, with 3 classified as high severity, indicating potential for data manipulation or unauthorized access if these flows are triggered. The lack of nonce and capability checks across all entry points is a major weakness, as it means any authenticated user could potentially interact with these functions in unintended ways. The plugin's vulnerability history being clean is a positive sign, but it doesn't negate the direct code-level risks identified.
In conclusion, while the plugin has no documented vulnerabilities and a small attack surface, the identified code signals and taint analysis point to significant potential risks. The lack of output escaping and the high severity taint flows are particularly concerning and require immediate attention. The absence of nonce and capability checks further exacerbates these issues, creating a scenario where authenticated users could exploit weaknesses. Developers should prioritize addressing these findings to improve the plugin's security.
Key Concerns
- 0% of outputs properly escaped
- High severity taint flows (3)
- Dangerous functions: ini_set
- Nonce checks missing
- Capability checks missing
- SQL queries not using prepared statements
Poll Lite Security Vulnerabilities
Poll Lite Release Timeline
Poll Lite Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Poll Lite Attack Surface
Shortcodes 1
WordPress Hooks 7
Maintenance & Trust
Poll Lite Maintenance & Trust
Maintenance Signals
Community Trust
Poll Lite Alternatives
No alternatives data available yet.
Poll Lite Developer Profile
5 plugins · 50 total installs
How We Detect Poll Lite
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/poll-lite/style/default.css/wp-content/plugins/poll-lite/js/default.js/wp-content/plugins/poll-lite/js/default.jsHTML / DOM Fingerprints
merlic_pollmerlic_poll_resultdata-poll-id<h3>