Zervise Support for WordPress Security & Risk Analysis

wordpress.org/plugins/zervise

Zervise Support for WordPress is the best way to give your customers support right from your site.

0 active installs v1.1.0 PHP 7.0+ WP 4.7+ Updated Unknown
customer-supporthelp-deskhelpdeskservice-desksupport
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Zervise Support for WordPress Safe to Use in 2026?

Generally Safe

Score 100/100

Zervise Support for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The zervise plugin v1.1.0 exhibits a strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the code shows good practices regarding SQL queries, as all identified queries utilize prepared statements. The high percentage of properly escaped output also indicates a good effort to prevent cross-site scripting (XSS) vulnerabilities.

Despite these strengths, the static analysis reveals zero nonce checks and zero capability checks across the plugin's code. This is a significant concern, as these mechanisms are crucial for preventing common WordPress vulnerabilities like Cross-Site Request Forgery (CSRF) and unauthorized actions. While the attack surface is currently zero, any future addition of entry points without proper authentication and authorization checks will present a substantial risk.

The plugin's vulnerability history is clean, with no recorded CVEs. This, coupled with the static analysis findings of no critical or high severity taint flows, suggests a well-developed plugin. However, the lack of nonce and capability checks remains a critical area for improvement to ensure robust security, especially as the plugin evolves.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Some output not properly escaped
Vulnerabilities
None known

Zervise Support for WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Zervise Support for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
20 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

77% escaped26 total outputs
Attack Surface

Zervise Support for WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_enqueue_scriptsincludes\zervise-scripts.php:15
actionwidgets_initzervise.php:28
Maintenance & Trust

Zervise Support for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedUnknown
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Zervise Support for WordPress Developer Profile

Zervise

2 plugins · 0 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Zervise Support for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/zervise/includes/css/style.css/wp-content/plugins/zervise/includes/js/main.js
Script Paths
https://cdn.jsdelivr.net/npm/socket.io-client@4.1.2/dist/socket.io.js

HTML / DOM Fingerprints

CSS Classes
yts-main-styleyts-main-script
FAQ

Frequently Asked Questions about Zervise Support for WordPress