Widget Click to Chat Security & Risk Analysis

wordpress.org/plugins/widgetwhats-app

100% FREE Responsive WhatsApp Chat Widget with page targeting and floating button style. Fully Customizable!

500 active installs v2.0.1 PHP 5.3+ WP 4.6+ Updated Sep 13, 2022
whatsappwhatsapp-businesswhatsapp-buttonwhatsapp-chatwhatsapp-widget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Widget Click to Chat Safe to Use in 2026?

Generally Safe

Score 85/100

Widget Click to Chat has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The 'widgetwhats-app' v2.0.1 plugin exhibits a generally positive security posture based on the static analysis provided. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface, and importantly, there are no identified unprotected entry points. The code also shows good practices with 100% of SQL queries utilizing prepared statements and a single capability check present, indicating an awareness of authorization. However, a notable concern is the low percentage of properly escaped output (14%). This could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is directly rendered without adequate sanitization, especially given the lack of taint analysis data which might have identified such flows.

The plugin's vulnerability history is completely clear, with no recorded CVEs. This is a strong indicator of either meticulous development or a lack of historical security scrutiny. While the absence of known vulnerabilities is reassuring, it is crucial to remember that this is based on past data. The low output escaping percentage, despite the clean history, presents a potential for future vulnerabilities that might not have been discovered or exploited previously. Therefore, while the plugin appears robust due to its limited attack surface and good SQL practices, the insufficient output escaping warrants attention.

Key Concerns

  • Low output escaping percentage
Vulnerabilities
None known

Widget Click to Chat Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Widget Click to Chat Release Timeline

v2.0.1Current
v2.0.0
v1.1.1
v1.1
v1.0
Code Analysis
Analyzed Mar 16, 2026

Widget Click to Chat Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

14% escaped14 total outputs
Attack Surface

Widget Click to Chat Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_initwidgetwhats.php:23
actionadmin_menuwidgetwhats.php:24
actionwp_loadedwidgetwhats.php:25
filterwp_resource_hintswidgetwhats.php:26
actionwp_footerwidgetwhats.php:27
actionadmin_print_footer_scriptswidgetwhats.php:178
actionadmin_enqueue_scriptswidgetwhats.php:186
Maintenance & Trust

Widget Click to Chat Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedSep 13, 2022
PHP min version5.3
Downloads32K

Community Trust

Rating100/100
Number of ratings5
Active installs500
Developer Profile

Widget Click to Chat Developer Profile

Creame

3 plugins · 701K total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Widget Click to Chat

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
create-widget
Data Attributes
data-wwwa
JS Globals
jQuery
FAQ

Frequently Asked Questions about Widget Click to Chat