WP phone Security & Risk Analysis

wordpress.org/plugins/wp-phone

Take calls on your website.

10 active installs v1.1 PHP + WP 3.3+ Updated Unknown
calltelephonevoicevoipwp-phone
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP phone Safe to Use in 2026?

Generally Safe

Score 100/100

WP phone has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "wp-phone" v1.1 plugin presents a significant security risk due to critical vulnerabilities identified in its static analysis. A notable concern is the presence of an unprotected AJAX handler, which represents a direct entry point into the plugin's functionality without any authentication or authorization checks. This opens the door for unauthenticated users to potentially trigger malicious actions. Furthermore, the analysis reveals a concerning lack of output escaping, with 100% of outputs not being properly escaped. This makes the plugin highly susceptible to Cross-Site Scripting (XSS) attacks, where an attacker could inject malicious scripts into the website's frontend.

The plugin's vulnerability history is currently clear, with no known CVEs. This might suggest that the plugin hasn't been widely targeted or has recently been developed. However, the static analysis findings, particularly the unprotected AJAX handler and the widespread lack of output escaping, strongly indicate a foundational insecurity that could be easily exploited. The presence of the `unserialize` function, while not explicitly shown to be exploitable in the taint analysis, is often a vector for serious vulnerabilities when not handled with extreme caution, especially in conjunction with user-supplied data.

In conclusion, despite the absence of known CVEs, "wp-phone" v1.1 exhibits a poor security posture. The unprotected AJAX endpoint and the complete failure to escape output are critical flaws that demand immediate attention. While the use of prepared statements for SQL queries is a positive aspect, it does not mitigate the more pressing threats posed by the other vulnerabilities. The plugin's security needs substantial improvement before it can be considered safe for production environments.

Key Concerns

  • Unprotected AJAX handler found
  • 100% of outputs unescaped
  • Dangerous function: unserialize
  • Total entry points: 1, Unprotected: 1
  • No nonce checks on entry points
Vulnerabilities
None known

WP phone Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP phone Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
10
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$wp_phone_options=unserialize($wp_phone_options);wp-phone.php:86

Output Escaping

0% escaped10 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
wp_phone_save_user_data (wp-phone.php:315)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

WP phone Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_wp_phone_save_user_datawp-phone.php:314
WordPress Hooks 4
actionadmin_initwp-phone.php:33
actionadmin_menuwp-phone.php:37
actionadmin_footerwp-phone.php:43
filterthe_contentwp-phone.php:344
Maintenance & Trust

WP phone Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

WP phone Developer Profile

TaylorHawkes

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP phone

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-phone/js/intlTelInput.min.js/wp-content/plugins/wp-phone/js/signup.js/wp-content/plugins/wp-phone/js/twilio_find_number.js
Script Paths
js/intlTelInput.min.jsjs/signup.jsjs/twilio_find_number.js

HTML / DOM Fingerprints

CSS Classes
wp_phone_form_tablewp_phone_holderwp_phone_default_number_shortcode
HTML Comments
<!-- stuff to do when we create plugin --><!-- these are for updting the cache automaticly --><!-- start of form-->
Data Attributes
id="wp_phone_holder"class="wp_phone_form_table"id="wp_phone_sync_form"id="wp_register_form"class="wp_phone_default_number_shortcode"
JS Globals
intlTelInput.min.jssignup.jstwilio_find_number.js
Shortcode Output
[wp_phone_number]get_option("wp_phone_number")
FAQ

Frequently Asked Questions about WP phone