Replain Security & Risk Analysis

wordpress.org/plugins/replain

Be in touch with your clients through Telegram, WhatsApp or Facebook Messenger. Fast, functional and free live-chat service for your website.

800 active installs v1.9.1 PHP 5.2.4+ WP 4.6+ Updated Nov 2, 2020
facebook-messengerlive-chat-pluginreplain-live-chattelegramwordpress-live-chat
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Replain Safe to Use in 2026?

Generally Safe

Score 85/100

Replain has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

Based on the static analysis and vulnerability history, the 'replain' plugin v1.9.1 exhibits a strong security posture with several good practices observed. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events with unauthenticated access significantly limits the attack surface. Furthermore, the code demonstrates a commitment to security by using prepared statements for all SQL queries, implementing nonce checks, and employing capability checks for its operations. The lack of any recorded vulnerabilities, critical or otherwise, in its history is a positive indicator of consistent security development.

However, a potential concern arises from the low percentage of properly escaped output (9%). With 11 total outputs analyzed, this means at least one output is likely not being adequately sanitized, which could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is involved in these unsanitized outputs. While the taint analysis shows no unsanitized paths, the output escaping percentage is a specific area to monitor. The plugin also does not bundle any external libraries, which removes the risk of vulnerable bundled components.

In conclusion, the 'replain' plugin v1.9.1 is generally well-secured, with a very limited attack surface and robust handling of sensitive operations like database queries. The primary area of attention is the output escaping, which, despite the absence of explicit XSS findings in the taint analysis, represents a deviation from best practices and a potential, albeit low, risk.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Replain Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Replain Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
1 escaped
Nonce Checks
1
Capability Checks
5
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

9% escaped11 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
replain_toplevel_page (replain.php:110)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Replain Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedreplain.php:33
actionwp_before_admin_bar_renderreplain.php:40
actionadmin_enqueue_scriptsreplain.php:60
actionwp_enqueue_scriptsreplain.php:61
actionadmin_menureplain.php:104
actionwp_footerreplain.php:192
Maintenance & Trust

Replain Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedNov 2, 2020
PHP min version5.2.4
Downloads15K

Community Trust

Rating94/100
Number of ratings12
Active installs800
Developer Profile

Replain Developer Profile

replainchat

1 plugin · 800 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Replain

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/replain/assets/css/replain-wp-toolbar-link.css
Script Paths
https://widget.replain.cc/dist/client.js

HTML / DOM Fingerprints

CSS Classes
replain-bot-link
Data Attributes
data-replain-id
JS Globals
window.replainSettings
FAQ

Frequently Asked Questions about Replain