AWeber Dev Facile Security & Risk Analysis

wordpress.org/plugins/aweber-dev-facile

Display Total AWeber Subscribers Count from one or selected lists / Affiche le nombre d'abonnés AWeber d'une ou plusieurs listes.

10 active installs v0.1 PHP + WP 3.0+ Updated May 11, 2015
awebercountcounterlistsubscribers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is AWeber Dev Facile Safe to Use in 2026?

Generally Safe

Score 85/100

AWeber Dev Facile has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The plugin 'aweber-dev-facile' v0.1 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by utilizing prepared statements for all its SQL queries and has no known vulnerability history, suggesting a generally well-maintained codebase. There are no direct indications of critical or high-severity issues from the static and taint analysis.

However, several areas raise concerns. The low percentage of properly escaped output (17%) is a significant weakness, indicating a high probability of cross-site scripting (XSS) vulnerabilities. The absence of nonce checks and capability checks on its single entry point (a shortcode) means that any user, regardless of their role or authentication status, can potentially trigger its functionality, which could be exploited if the shortcode handles any user-supplied data. While the attack surface is small and currently appears unprotected, the lack of proper authorization and sanitization on this single point is a notable risk.

In conclusion, while the plugin avoids common pitfalls like raw SQL and known vulnerabilities, the weak output escaping and the unprotected shortcode present substantial security risks. These areas require immediate attention to improve the plugin's overall security.

Key Concerns

  • Low output escaping rate
  • Shortcode lacks nonce check
  • Shortcode lacks capability check
Vulnerabilities
None known

AWeber Dev Facile Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

AWeber Dev Facile Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

17% escaped18 total outputs
Attack Surface

AWeber Dev Facile Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[AWcount] aweber-devfacile.php:126
WordPress Hooks 3
actionadmin_menuaweber-devfacile.php:110
actionplugins_loadedaweber-devfacile.php:119
filterlocaleaweber-devfacile.php:134
Maintenance & Trust

AWeber Dev Facile Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedMay 11, 2015
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

AWeber Dev Facile Developer Profile

Matthieu20

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AWeber Dev Facile

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/aweber-dev-facile/aweber_api/aweber_api.php/wp-content/plugins/aweber-dev-facile/classes/main.php/wp-content/plugins/aweber-dev-facile/classes/plugin.php/wp-content/plugins/aweber-dev-facile/classes/settings.php/wp-content/plugins/aweber-dev-facile/classes/admin/admin.php/wp-content/plugins/aweber-dev-facile/classes/admin/copywriting.php/wp-content/plugins/aweber-dev-facile/classes/admin/main.php/wp-content/plugins/aweber-dev-facile/functions/api-AW-devfacile.php
Version Parameters
aweber-dev-facileDEV_VERSION

HTML / DOM Fingerprints

Shortcode Output
[AWcount select="list-name-1,list-name-2,list-name-3,list-name-4"][AWcount selectList="your_list_name_1, your_list_name_2"]
FAQ

Frequently Asked Questions about AWeber Dev Facile