123eworld SMS Security & Risk Analysis

wordpress.org/plugins/123eworld-sms

Configure 123eworld account details and send sms using 123eworld SMS API.

0 active installs v1.0.0 PHP + WP 3.8+ Updated Unknown
send-smssmssms-api
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is 123eworld SMS Safe to Use in 2026?

Generally Safe

Score 100/100

123eworld SMS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "123eworld-sms" plugin version 1.0.0 presents a mixed security posture. On the positive side, the plugin demonstrates good practices regarding SQL queries, utilizing prepared statements exclusively, and has no recorded vulnerability history, which suggests a level of diligence from the developer. However, the static analysis reveals significant security concerns, particularly in its handling of entry points.

The plugin has a total of one entry point, an AJAX handler, which critically lacks any authentication or capability checks. This is a major security flaw, as it exposes this handler to any unauthenticated user. While no dangerous functions were identified and external HTTP requests are present (which is not inherently bad), the absence of nonce checks and capability checks on the sole entry point creates a substantial risk. Taint analysis indicates flows with unsanitized paths, though no critical or high-severity issues were flagged in this specific analysis. The high percentage of properly escaped output (80%) is a positive signal, but it doesn't mitigate the risk posed by the unprotected AJAX handler.

In conclusion, the plugin's lack of authentication on its AJAX endpoint is its most pressing security weakness, overshadowing its strengths in SQL handling and its clean vulnerability history. This single unprotected entry point creates a direct path for potential exploitation. While the absence of known vulnerabilities is encouraging, the design of the AJAX handler poses an immediate and significant risk that needs urgent attention. The developer should prioritize implementing proper authentication and authorization mechanisms for all entry points.

Key Concerns

  • AJAX handler without auth checks
  • No nonce checks on entry points
  • No capability checks on entry points
  • Flows with unsanitized paths
  • Some output not properly escaped
Vulnerabilities
None known

123eworld SMS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

123eworld SMS Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

80% escaped15 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
send_sms (123eworld.php:138)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

123eworld SMS Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_eworld_send_sms123eworld.php:30
WordPress Hooks 3
actionadmin_menu123eworld.php:27
actionadmin_init123eworld.php:28
actioneworld_send_sms123eworld.php:31
Maintenance & Trust

123eworld SMS Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

123eworld SMS Developer Profile

123eworld

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect 123eworld SMS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/123eworld-sms/css/admin.css/wp-content/plugins/123eworld-sms/js/admin.js
Version Parameters
123eworld-sms/css/admin.css?ver=123eworld-sms/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
wrapdescriptionupdatederror
Data Attributes
name="123eworld_sms_option[user_name]"name="123eworld_sms_option[password]"name="123eworld_sms_option[senderid]"name="123eworld_sms_option[user_name]"name="123eworld_sms_option[password]"name="123eworld_sms_option[senderid]"+10 more
JS Globals
ajax_object.ajax_url
FAQ

Frequently Asked Questions about 123eworld SMS