Voizee Security & Risk Analysis

wordpress.org/plugins/voizee

Voizee is a powerful communications suite application that offers callbacks, live chat, SMS, and email capabilities, all in one integrated solution.

10 active installs v1.0.1 PHP 5.3+ WP 4.1.0+ Updated Jul 7, 2025
call-buttoncall-now-buttonlive-chatsms-messagingvoizee
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Voizee Safe to Use in 2026?

Generally Safe

Score 100/100

Voizee has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9mo ago
Risk Assessment

The voizee plugin v1.0.1 exhibits a generally strong security posture based on the static analysis and vulnerability history provided. The absence of identified CVEs and the fact that all reported SQL queries use prepared statements, and all output is properly escaped, are significant strengths. Furthermore, the plugin demonstrates good practices by implementing capability checks and nonce checks, even though the attack surface from AJAX handlers, REST API routes, shortcodes, and cron events is zero. This indicates a developer conscious of secure coding principles.

However, a notable concern is the presence of the `unserialize` function, which is a known source of vulnerabilities if not handled with extreme care. While taint analysis did not reveal any unsanitized paths, the potential for malicious serialized data to be injected and processed could lead to code execution or other serious issues if the input source is not strictly controlled. The plugin also makes external HTTP requests, which, if not implemented securely and validated, could expose the site to vulnerabilities like SSRF or credential theft. The limited scope of the taint analysis (2 flows) and the lack of a history of past vulnerabilities make it difficult to definitively assess the long-term security trends, but the current snapshot shows a developer who is largely adhering to secure coding standards.

In conclusion, voizee v1.0.1 has several positive security attributes, particularly its clean record regarding CVEs and its adherence to prepared statements and output escaping. The main area of vigilance for this plugin would be the use of `unserialize`. A thorough review of how serialized data is handled and whether all external HTTP requests are robustly secured is recommended to mitigate potential risks. The plugin's limited attack surface and good practices elsewhere are commendable.

Key Concerns

  • Presence of unserialize function
  • External HTTP requests made
Vulnerabilities
None known

Voizee Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Voizee Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
0
37 escaped
Nonce Checks
2
Capability Checks
4
File Operations
0
External Requests
3
Bundled Libraries
0

Dangerous Functions Found

unserialize$value = unserialize( $value );class-voizee.php:235

Output Escaping

100% escaped37 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
update_voizee_options (class-voizee-options.php:292)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Voizee Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
actionadmin_initclass-voizee-options.php:10
actionadmin_initclass-voizee-options.php:11
actionadmin_menuclass-voizee-options.php:12
actionadmin_enqueue_scriptsclass-voizee-options.php:81
actionwp_headclass-voizee.php:14
actioninitclass-voizee.php:16
actionadmin_menuclass-voizee.php:17
actionwpcf7_before_send_mailclass-voizee.php:46
actiongform_after_submissionclass-voizee.php:49
actionwp_dashboard_setupclass-voizee.php:432
actionplugins_loadedclass-voizee.php:579
actionadmin_noticesvoizee.php:58
actionadmin_noticesvoizee.php:63
actionadmin_enqueue_scriptsvoizee.php:69
actionadmin_enqueue_scriptsvoizee.php:70
filterplugin_action_linksvoizee.php:93
Maintenance & Trust

Voizee Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJul 7, 2025
PHP min version5.3
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Voizee Developer Profile

voizee

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Voizee

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/voizee/css/v_z_e.css/wp-content/plugins/voizee/js/chart.min.js/wp-content/plugins/voizee/js/voizee-dashboard.js/wp-content/plugins/voizee/js/voizee-forms-log.js
Script Paths
/wp-content/plugins/voizee/js/chart.min.js/wp-content/plugins/voizee/js/voizee-dashboard.js/wp-content/plugins/voizee/js/voizee-forms-log.js
Version Parameters
voizee/css/v_z_e.css?ver=voizee/js/chart.min.js?ver=voizee/js/voizee-dashboard.js?ver=voizee/js/voizee-forms-log.js?ver=

HTML / DOM Fingerprints

CSS Classes
voizee_errorvoizee_logovoizee_fieldvoizee_card
HTML Comments
<!-- Nonce field is included for CSRF protection. See process_voizee_options_submission() for verification. -->
Data Attributes
id="voizee_logo"name="voizee_form"id="voizee___ous"id="voizee_api_key"name="voizee_api_key"id="voizee_widget_script"+11 more
JS Globals
window.voizee_chartwindow.voizee_dashboardwindow.voizee_form_logs_script
FAQ

Frequently Asked Questions about Voizee