Want Flirty Leads Security & Risk Analysis

wordpress.org/plugins/want-flirty-leads

Want Flirty Leads lets your site visitors respond your site images. Send custom responses to Lead Capture, gain leads using your post/pages images.

0 active installs v1.0 PHP + WP 3.0+ Updated Unknown
call-to-actiondirect-dashboard-media-editingemail-campaignsimage-lead-capturelead-capture
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Want Flirty Leads Safe to Use in 2026?

Generally Safe

Score 100/100

Want Flirty Leads has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "want-flirty-leads" v1.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, file operations, external HTTP requests, and the consistent use of prepared statements for SQL queries are excellent indicators of secure coding practices. Furthermore, all identified output is properly escaped, and nonces are implemented on the identified AJAX entry points, mitigating common cross-site scripting and cross-site request forgery vulnerabilities. The plugin also boasts a clean vulnerability history with no recorded CVEs, suggesting a history of secure development or effective patching.

However, a notable concern arises from the complete lack of capability checks on the two identified AJAX handlers. While nonces provide a layer of protection against CSRF, they do not prevent authenticated users from exploiting these handlers if they lack the proper permissions. Without capability checks, any authenticated user, regardless of their role, could potentially trigger these AJAX actions. This represents a significant gap in authorization, as it relies solely on the presence of a nonce and does not restrict access based on user roles or permissions.

In conclusion, the plugin demonstrates a solid foundation in secure coding by avoiding many common pitfalls. The absence of exploitable taint flows and the proper handling of SQL and output are commendable. The primary weakness lies in the lack of granular authorization on its AJAX endpoints. While the absence of known vulnerabilities is positive, the missing capability checks introduce a potential risk that could be exploited by authenticated attackers with malicious intent.

Key Concerns

  • Missing capability checks on AJAX handlers
Vulnerabilities
None known

Want Flirty Leads Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Want Flirty Leads Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
19 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped19 total outputs
Attack Surface

Want Flirty Leads Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_wantflirtyleadswant-flirty-leads.php:1092
noprivwp_ajax_wantflirtyleadswant-flirty-leads.php:1093
WordPress Hooks 29
actionwp_enqueue_scriptswant-flirty-leads.php:68
filterthe_contentwant-flirty-leads.php:510
filterattachment_fields_to_editwant-flirty-leads.php:544
filterattachment_fields_to_savewant-flirty-leads.php:558
filterattachment_fields_to_editwant-flirty-leads.php:586
filterattachment_fields_to_savewant-flirty-leads.php:600
filterattachment_fields_to_editwant-flirty-leads.php:628
filterattachment_fields_to_savewant-flirty-leads.php:642
filterattachment_fields_to_editwant-flirty-leads.php:674
filterattachment_fields_to_savewant-flirty-leads.php:688
filterattachment_fields_to_editwant-flirty-leads.php:716
filterattachment_fields_to_savewant-flirty-leads.php:730
filterattachment_fields_to_editwant-flirty-leads.php:755
filterattachment_fields_to_savewant-flirty-leads.php:769
filterattachment_fields_to_editwant-flirty-leads.php:794
filterattachment_fields_to_savewant-flirty-leads.php:808
filterattachment_fields_to_editwant-flirty-leads.php:835
filterattachment_fields_to_savewant-flirty-leads.php:849
filterattachment_fields_to_editwant-flirty-leads.php:877
filterattachment_fields_to_savewant-flirty-leads.php:891
filterattachment_fields_to_editwant-flirty-leads.php:919
filterattachment_fields_to_savewant-flirty-leads.php:933
filterattachment_fields_to_editwant-flirty-leads.php:961
filterattachment_fields_to_savewant-flirty-leads.php:975
filterattachment_fields_to_editwant-flirty-leads.php:1001
filterattachment_fields_to_savewant-flirty-leads.php:1015
filterattachment_fields_to_editwant-flirty-leads.php:1041
filterattachment_fields_to_savewant-flirty-leads.php:1055
filterget_the_excerptwant-flirty-leads.php:1085
Maintenance & Trust

Want Flirty Leads Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedUnknown
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Want Flirty Leads Developer Profile

sageshilling

2 plugins · 10 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Want Flirty Leads

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/want-flirty-leads/css/style.css/wp-content/plugins/want-flirty-leads/js/wantflirty.ajax.js
Script Paths
/wp-content/plugins/want-flirty-leads/js/wantflirty.ajax.js
Version Parameters
wantflirtyleads-stylewantflirty-script

HTML / DOM Fingerprints

CSS Classes
item1_wfl
Data Attributes
data-postiddata-likedata-commentdata-share
JS Globals
postdata
FAQ

Frequently Asked Questions about Want Flirty Leads