Web Push Notifications by Aimtell Security & Risk Analysis

wordpress.org/plugins/aimtell-web-push-notifications

Aimtell enables users to re-engage their website visitors with highly targeted mobile & desktop web push notifications.

60 active installs v2.13 PHP + WP 4.7+ Updated Dec 16, 2025
chrome-push-notificationsmarketingrsssafari-push-notificationsweb-push-notifications
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Web Push Notifications by Aimtell Safe to Use in 2026?

Generally Safe

Score 100/100

Web Push Notifications by Aimtell has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The overall security posture of the aimtell-web-push-notifications plugin v2.13 appears to be strong, particularly concerning its limited attack surface and the absence of known vulnerabilities. The static analysis shows no AJAX handlers, REST API routes, shortcodes, or cron events exposed without proper authentication or permission checks. Furthermore, all SQL queries utilize prepared statements, and the taint analysis found no unsanitized flows. This indicates a deliberate effort by the developers to adhere to secure coding practices and minimize potential entry points for attackers. The plugin also demonstrates good security practices with the presence of nonce and capability checks, and external HTTP requests are handled within a single instance.

Despite the generally positive findings, there are minor areas for improvement. A notable concern is the relatively low percentage (43%) of properly escaped output. This could leave the plugin susceptible to cross-site scripting (XSS) vulnerabilities if user-supplied data is not sufficiently sanitized before being displayed to the end-user. The presence of a single file operation and a single external HTTP request, while seemingly controlled, warrants careful review to ensure they are implemented securely and do not introduce unintended risks. The bundled Select2 library, while common, should be kept up-to-date to mitigate any potential vulnerabilities within it.

The vulnerability history is exceptionally clean, with zero recorded CVEs across all severity levels and no recorded common vulnerability types. This pattern suggests a development team that is either highly diligent in their security practices, responsive to security issues, or has not yet encountered significant security challenges. In conclusion, the plugin is commendably secure in its structural design and vulnerability management. The primary area of focus for further hardening should be on ensuring all output is consistently and correctly escaped to prevent potential XSS exploits.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Web Push Notifications by Aimtell Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Web Push Notifications by Aimtell Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
16 prepared
Unescaped Output
8
6 escaped
Nonce Checks
1
Capability Checks
1
File Operations
1
External Requests
1
Bundled Libraries
1

Bundled Libraries

Select2

SQL Query Safety

100% prepared16 total queries

Output Escaping

43% escaped14 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
aimtellWP_admin_load (aimtell.php:262)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Web Push Notifications by Aimtell Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionadmin_menuaimtell.php:492
actionwp_footeraimtell.php:493
actionadmin_enqueue_scriptsaimtell.php:494
filteradmin_footer_textaimtell.php:495
actionadmin_menuaimtell.php:497
actionadmin_post_save_aimtell_settingsaimtell.php:498
actionwoocommerce_cart_updatedintegrations\aimtell-wc.php:107
actionwoocommerce_add_cart_item_dataintegrations\aimtell-wc.php:110
actionwp_footerintegrations\aimtell-wc.php:119
Maintenance & Trust

Web Push Notifications by Aimtell Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 16, 2025
PHP min version
Downloads8K

Community Trust

Rating100/100
Number of ratings1
Active installs60
Developer Profile

Web Push Notifications by Aimtell Developer Profile

aimtell

1 plugin · 60 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Web Push Notifications by Aimtell

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/aimtell-web-push-notifications/assets/js/aimtell-worker.js.php/wp-content/plugins/aimtell-web-push-notifications/assets/json/aimtell-manifest.json
Script Paths
//s3.amazonaws.com/cdn.aimtell.com/trackpush/trackpush.min.js

HTML / DOM Fingerprints

HTML Comments
<!-- start aimtell tracking code --><!-- end aimtell tracking code --><!-- start aimtell abandoned browse tracking code --><!-- end aimtell abandoned browse tracking code -->
Data Attributes
data-cfasync='false'
JS Globals
window._atwindow._aimtellAbandonedBrowseDelaywindow._aimtellBrowseAbandonedwindow._aimtellTimeoutwindow._aimtellGetTrackProductwindow._aimtellResetTimer+1 more
FAQ

Frequently Asked Questions about Web Push Notifications by Aimtell