Sales Layer Microsites Security & Risk Analysis

wordpress.org/plugins/sales-layer-wp-microsites

A simple and easy way to set up a website that shows your product catalog with all the information that you want in minutes!

10 active installs v1.7 PHP 5.6+ WP 3.0.1+ Updated Aug 27, 2019
automationcatalog-managementcontent-managementpimproduct-management
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Sales Layer Microsites Safe to Use in 2026?

Generally Safe

Score 85/100

Sales Layer Microsites has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "sales-layer-wp-microsites" plugin version 1.7 exhibits a mixed security posture. On the positive side, it has no recorded vulnerabilities (CVEs), and its code shows good practices such as a high percentage of SQL queries using prepared statements and properly escaped output. The absence of dangerous functions and critical or high severity taint flows is also a strong indicator of a relatively secure codebase. Furthermore, there are no shortcodes, cron events, or bundled libraries to worry about, limiting the potential attack surface in those areas.

However, there are notable concerns that detract from an otherwise strong security profile. The presence of three AJAX handlers, with one lacking any authentication checks, represents a significant potential entry point for malicious actors. While the overall taint analysis did not reveal critical or high severity issues, the single unprotected AJAX handler could potentially be exploited if it interacts with sensitive data or functions in an insecure manner. The limited number of nonce checks (1) and capability checks (4) in relation to the entry points also suggests room for improvement in securing these interfaces.

In conclusion, the plugin is generally well-coded with a clear absence of historical vulnerabilities. This suggests diligent development and maintenance. However, the unprotected AJAX handler is a specific and actionable security concern that needs immediate attention. Addressing this single point of failure would significantly improve the plugin's overall security posture.

Key Concerns

  • Unprotected AJAX handler
  • Low number of Nonce checks
  • Low number of Capability checks
Vulnerabilities
None known

Sales Layer Microsites Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Sales Layer Microsites Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
10 prepared
Unescaped Output
17
85 escaped
Nonce Checks
1
Capability Checks
4
File Operations
2
External Requests
2
Bundled Libraries
0

SQL Query Safety

71% prepared14 total queries

Output Escaping

83% escaped102 total outputs
Data Flows
All sanitized

Data Flow Analysis

3 flows
<config> (config.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Sales Layer Microsites Attack Surface

Entry Points3
Unprotected1

AJAX Handlers 3

noprivwp_ajax_slyrmc_catalog_controlcontroller.php:344
authwp_ajax_slyrmc_catalog_controlcontroller.php:346
noprivwp_ajax_slyrmc_refresh_connectorcontroller.php:348
WordPress Hooks 7
actionadmin_menucontroller.php:96
actionwp_enqueue_scriptscontroller.php:143
actionwp_enqueue_scriptscontroller.php:144
actioninitcontroller.php:177
actioninitcontroller.php:179
actionquery_varscontroller.php:186
actionparse_requestcontroller.php:193
Maintenance & Trust

Sales Layer Microsites Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedAug 27, 2019
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Sales Layer Microsites Developer Profile

saleslayer

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Sales Layer Microsites

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sales-layer-wp-microsites/css/style_admin.css/wp-content/plugins/sales-layer-wp-microsites/css/style.css
Script Paths
/wp-content/plugins/sales-layer-wp-microsites/js/script.js/wp-content/plugins/sales-layer-wp-microsites/js/catalog.js/wp-content/plugins/sales-layer-wp-microsites/js/shadowbox.js
Version Parameters
sales-layer-wp-microsites/css/style.css?ver=

HTML / DOM Fingerprints

JS Globals
window.sls_configSLYRMC_TOKEN_SL
REST Endpoints
/wp-json/saleslayer/v1/catalog
Shortcode Output
[saleslayer_catalog]
FAQ

Frequently Asked Questions about Sales Layer Microsites