
ACF: MadMimi Audience List Security & Risk Analysis
wordpress.org/plugins/acf-madmimi-audience-listA field for Advanced Custom Fields which allows you to select one or more of your MadMimi audience lists
Is ACF: MadMimi Audience List Safe to Use in 2026?
Generally Safe
Score 85/100ACF: MadMimi Audience List has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "acf-madmimi-audience-list" plugin v1.0.2 exhibits a generally good security posture with no known vulnerabilities and a limited attack surface. The static analysis reveals a complete absence of dangerous functions, external HTTP requests, file operations, and SQL queries that aren't using prepared statements. This indicates a solid foundation in secure coding practices regarding these critical areas. However, a significant concern arises from the output escaping, where only 47% of outputs are properly escaped. This leaves a notable portion of data potentially vulnerable to cross-site scripting (XSS) attacks if user-supplied data is rendered directly without sufficient sanitization. Additionally, the taint analysis identified two flows with unsanitized paths. While these did not result in critical or high severity findings, they represent potential weaknesses where malicious input could traverse through the code without proper sanitization, possibly leading to unexpected behavior or further vulnerabilities if combined with other factors.
Despite the absence of past CVEs, which is a positive indicator of historical security, the current static analysis highlights areas requiring attention. The lack of nonce checks and capability checks on all entry points, though there are currently zero unprotected entry points, means that if new entry points were introduced in future versions without proper security controls, the plugin could become vulnerable. The limited attack surface is a strength, but the identified issues with output escaping and taint flows suggest that a deeper review and remediation are necessary to ensure a truly robust security profile.
Key Concerns
- Low output escaping percentage
- Taint flow with unsanitized path (x2)
- No nonce checks on entry points
- No capability checks on entry points
ACF: MadMimi Audience List Security Vulnerabilities
ACF: MadMimi Audience List Code Analysis
Output Escaping
Data Flow Analysis
ACF: MadMimi Audience List Attack Surface
WordPress Hooks 4
Maintenance & Trust
ACF: MadMimi Audience List Maintenance & Trust
Maintenance Signals
Community Trust
ACF: MadMimi Audience List Alternatives
Advanced Custom Fields (ACF®)
advanced-custom-fields
ACF helps customize WordPress with powerful, professional and intuitive fields. Proudly powering over 2 million sites, WordPress developers love ACF.
ACF Content Analysis for Yoast SEO
acf-content-analysis-for-yoast-seo
WordPress plugin that adds the content of all ACF fields to the Yoast SEO score analysis.
Advanced Custom Fields: Extended
acf-extended
All-in-one enhancement suite that improves WordPress & Advanced Custom Fields.
Advanced Custom Fields: Font Awesome Field
advanced-custom-fields-font-awesome
Adds a new 'Font Awesome Icon' field to the popular Advanced Custom Fields plugin.
Table Field Add-on for ACF and SCF
advanced-custom-fields-table-field
A Table Field Add-on for the Advanced Custom Fields and Secure Custom Fields Plugin.
ACF: MadMimi Audience List Developer Profile
12 plugins · 7K total installs
How We Detect ACF: MadMimi Audience List
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/acf-madmimi-audience-list/acf-madmimi_audience_list-v5.php/wp-content/plugins/acf-madmimi-audience-list/acf-madmimi_audience_list-v4.php/wp-content/plugins/acf-madmimi-audience-list/lang/