ResponseTap WP Security & Risk Analysis

wordpress.org/plugins/responsetappr

A ResponseTap integration for Wordpress.

0 active installs v1.1.3 PHP 7.0.0+ WP 2.9+ Updated Unknown
callcall-trackingherdlresponsetaptracking
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ResponseTap WP Safe to Use in 2026?

Generally Safe

Score 100/100

ResponseTap WP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'responsetappr' plugin v1.1.3 exhibits a generally good security posture based on the provided static analysis and vulnerability history. The absence of known CVEs and the use of prepared statements for all SQL queries are significant strengths. The plugin also demonstrates a commitment to security by including nonce and capability checks, which are essential for protecting against common WordPress attacks. The attack surface is minimal and appears to be protected by authentication, which is excellent.

However, a notable concern arises from the output escaping. With 100% of outputs not being properly escaped, this presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic content rendered by the plugin that is not explicitly sanitized and escaped before display can be leveraged by attackers to inject malicious scripts. While the taint analysis did not reveal any unsanitized paths, this is likely because the analysis scope was limited, and the unescaped outputs create ample opportunity for such issues to manifest if user-supplied data is involved.

In conclusion, the plugin's foundation is solid with good security practices in place for its entry points and data handling. Nevertheless, the widespread lack of output escaping is a critical weakness that needs immediate attention. The absence of historical vulnerabilities is positive, but it should not lead to complacency, especially given the identified XSS risk.

Key Concerns

  • 0% of outputs properly escaped
Vulnerabilities
None known

ResponseTap WP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

ResponseTap WP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
0 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped8 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
responsetap_wp_settings (responsetappr.php:24)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

ResponseTap WP Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[responsetap_wp] responsetappr.php:66
WordPress Hooks 2
actionadmin_menuresponsetappr.php:64
actionwp_footerresponsetappr.php:65
Maintenance & Trust

ResponseTap WP Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedUnknown
PHP min version7.0.0
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

ResponseTap WP Developer Profile

garethmorgans

3 plugins · 30 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ResponseTap WP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/responsetappr/templates/script.php

HTML / DOM Fingerprints

CSS Classes
rTapNumber
Shortcode Output
<a href="tel:</span></a>
FAQ

Frequently Asked Questions about ResponseTap WP