SiteGlue Security & Risk Analysis

wordpress.org/plugins/siteglue

Convert visitors into customers. Make it easy for mobile visitors to ask a question, get a quote or schedule an appointment via text message.

10 active installs v1.0 PHP + WP 2.7+ Updated Mar 11, 2016
live-chatmessaging-appsmssms-chatsms-conversations
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SiteGlue Safe to Use in 2026?

Generally Safe

Score 85/100

SiteGlue has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "siteglue" v1.0 plugin exhibits a strong security posture in several key areas, with no recorded vulnerabilities, a lack of dangerous functions, and the exclusive use of prepared statements for SQL queries. The absence of file operations and external HTTP requests further reduces the potential for common attack vectors. However, the static analysis reveals a critical weakness: 100% of its output is not properly escaped. This presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the website through the plugin's output.

While the plugin has no known CVEs and a clean vulnerability history, this lack of past issues doesn't negate the immediate risk posed by the unescaped output. The attack surface is currently zero, which is excellent, but this is a small sample size and doesn't guarantee future safety, especially if functionality is added without proper security considerations. The lack of capability checks and nonce checks, while not directly exploitable due to the current lack of entry points, would become immediate concerns if any new AJAX handlers, REST API routes, or shortcodes were introduced without them.

In conclusion, "siteglue" v1.0 has several good security practices in place, particularly regarding SQL and the absence of known vulnerabilities. The primary concern is the pervasive lack of output escaping, which creates a high risk for XSS. The current minimal attack surface is a positive sign, but the unescaped output is a serious flaw that needs immediate attention to prevent potential compromises.

Key Concerns

  • Output escaping is not used on any output
  • No capability checks detected
  • No nonce checks detected
Vulnerabilities
None known

SiteGlue Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SiteGlue Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

SiteGlue Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menusiteglue-plugin.php:50
actionadmin_initsiteglue-plugin.php:53
actionadmin_enqueue_scriptssiteglue-plugin.php:57
actionwp_enqueue_scriptssiteglue-plugin.php:60
filterclean_urlsiteglue-plugin.php:61
Maintenance & Trust

SiteGlue Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedMar 11, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

SiteGlue Developer Profile

siteglue

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SiteGlue

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
http://load.lokalmotion.com/cs_widget/v2/cw_lokalmotion.js

HTML / DOM Fingerprints

CSS Classes
siteglue-top-sectionrow-gluetop-titlebtn-get-it-now
Data Attributes
data-lokalmotion-phonedata-lokalmotion-bgdata-lokalmotion-colordata-lokalmotion-text
FAQ

Frequently Asked Questions about SiteGlue