VABE / Button – Floating Chat Widget Security & Risk Analysis

wordpress.org/plugins/vabe-button

FREE widget! Chat with your customers via WhatsApp, Facebook Messenger, Telegram, Viber and other apps.

40 active installs v1.0 PHP + WP 2.7+ Updated May 5, 2021
chatchat-freefacebook-messengerviberwhatsapp
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is VABE / Button – Floating Chat Widget Safe to Use in 2026?

Generally Safe

Score 85/100

VABE / Button – Floating Chat Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "vabe-button" v1.0 plugin exhibits a strong security posture in several key areas based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the complete avoidance of dangerous functions, file operations, and external HTTP requests is commendable. The fact that all SQL queries utilize prepared statements is a critical best practice that prevents SQL injection vulnerabilities.

However, the analysis also reveals notable areas of concern. A substantial portion of output (69%) is not properly escaped, presenting a significant risk for Cross-Site Scripting (XSS) vulnerabilities. The complete lack of nonce checks and capability checks across all identified entry points (though none were found) suggests a potential weakness if new entry points are introduced without proper security measures. The fact that there are no recorded vulnerabilities in its history is positive, but the lack of historical data makes it difficult to draw strong conclusions about long-term maintainability and proactive security practices.

In conclusion, while the plugin has demonstrated good practices in preventing common vulnerabilities like SQL injection and limiting its attack surface, the high rate of unescaped output is a critical flaw that needs immediate attention. The absence of comprehensive security checks like nonces and capability checks also represents a latent risk that could be exploited if the plugin's functionality expands. Addressing the unescaped output is paramount to improving its security.

Key Concerns

  • Unescaped output detected (31% properly escaped)
  • Missing nonce checks on all entry points
  • Missing capability checks on all entry points
Vulnerabilities
None known

VABE / Button – Floating Chat Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

VABE / Button – Floating Chat Widget Release Timeline

v1.0Current
Code Analysis
Analyzed Mar 16, 2026

VABE / Button – Floating Chat Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

31% escaped13 total outputs
Attack Surface

VABE / Button – Floating Chat Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuvabe_button.php:62
actionwp_footervabe_button.php:63
Maintenance & Trust

VABE / Button – Floating Chat Widget Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedMay 5, 2021
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

VABE / Button – Floating Chat Widget Developer Profile

vabeio

1 plugin · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect VABE / Button – Floating Chat Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<textarea cols="80" rows="15" name="vabe-code">
FAQ

Frequently Asked Questions about VABE / Button – Floating Chat Widget