RequestLogic Security & Risk Analysis

wordpress.org/plugins/requestlogic

This plugin is a marketing tool used to expand and manage your fan base and learn about their interests.

0 active installs v1.0.0 PHP 7.2+ WP 4.0.1+ Updated Jun 25, 2021
emailembed-formmarketingrequestlogicsubscriber
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is RequestLogic Safe to Use in 2026?

Generally Safe

Score 85/100

RequestLogic has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The 'requestlogic' plugin v1.0.0 demonstrates several positive security practices, notably the complete absence of known vulnerabilities and a commitment to using prepared statements for all SQL queries. The static analysis also shows a limited attack surface with no unprotected AJAX handlers or REST API routes, and no cron events. This suggests a developer who is mindful of common WordPress security pitfalls.

However, significant concerns arise from the output escaping and capability checks. The fact that 100% of the plugin's outputs are not properly escaped presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the complete lack of nonce checks and capability checks on its entry points, including the identified shortcode, leaves it vulnerable to various forms of injection attacks and unauthorized actions if any user input is processed without proper validation and authorization.

While the plugin's vulnerability history is clean and the taint analysis shows no critical or high severity flows, the current code analysis reveals critical weaknesses. The strengths lie in its SQL handling and limited attack vectors, but the glaring issues with output escaping and missing authorization controls significantly overshadow these positives, leading to a moderate to high overall risk profile for this version.

Key Concerns

  • 100% of outputs are not properly escaped
  • No nonce checks present
  • No capability checks present
Vulnerabilities
None known

RequestLogic Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

RequestLogic Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

RequestLogic Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

RequestLogic Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[requestlogic] requestlogic.php:117
WordPress Hooks 3
actioninitrequestlogic.php:42
actionadmin_enqueue_scriptsrequestlogic.php:47
actionadmin_menurequestlogic.php:49
Maintenance & Trust

RequestLogic Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedJun 25, 2021
PHP min version7.2
Downloads898

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

RequestLogic Developer Profile

Berries and Company

2 plugins · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect RequestLogic

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/requestlogic/assets/bootstrap.min.css/wp-content/plugins/requestlogic/assets/bootstrap.min.js/wp-content/plugins/requestlogic/assets/forms.css/wp-content/plugins/requestlogic/assets/forms.js

HTML / DOM Fingerprints

REST Endpoints
/api/:accountid/form/:formid/:key/wordpress
FAQ

Frequently Asked Questions about RequestLogic