BinduSms Security & Risk Analysis

wordpress.org/plugins/bindusms

Notify your customers about their WooCommerce order updates via SMS.

0 active installs v1.0.0 PHP 7.1+ WP 3.5+ Updated Nov 3, 2022
bangladeshorder-notifysmsupdatewoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is BinduSms Safe to Use in 2026?

Generally Safe

Score 85/100

BinduSms has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The bindusms v1.0.0 plugin exhibits a generally strong security posture based on the provided static analysis. The plugin has zero recorded vulnerabilities, which is a significant positive indicator. Furthermore, the code analysis reveals no dangerous functions, no direct SQL queries (all are prepared), and a very high percentage of properly escaped output. The attack surface is also minimal, with no identified AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, none of these potential entry points are left unprotected.

However, a single external HTTP request without further context could represent a potential risk if the target endpoint is not trusted or properly secured, or if sensitive data is sent without encryption. While there is a nonce check and a capability check present, the low number of total entry points means these checks might not cover all potential interaction vectors if the plugin were to evolve. The complete absence of taint analysis results could indicate either a very small or straightforward code base, or that the analysis tool did not identify any flows, which is generally a good sign but doesn't rule out the possibility of subtle vulnerabilities.

In conclusion, bindusms v1.0.0 appears to be a well-developed plugin from a security perspective, with a lack of historical vulnerabilities and robust implementation of core security practices like prepared statements and output escaping. The primary area to remain aware of is the single external HTTP request and the need to ensure its interaction is secure. The absence of any negative findings in taint analysis is also a positive sign for its current version.

Key Concerns

  • External HTTP request without context
Vulnerabilities
None known

BinduSms Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

BinduSms Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
26 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

96% escaped27 total outputs
Attack Surface

BinduSms Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedbindusms.php:45
actionwoocommerce_order_status_changedbindusms.php:114
actionwoocommerce_new_orderbindusms.php:115
actionadmin_menuincludes\Admin\Menu.php:16
actionadmin_initincludes\Admin.php:23
Maintenance & Trust

BinduSms Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.0
Last updatedNov 3, 2022
PHP min version7.1
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

BinduSms Developer Profile

BinduLogic

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect BinduSms

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/bindusms/assets/css/bindusms-admin.css/wp-content/plugins/bindusms/assets/js/bindusms-admin.js
Script Paths
/wp-content/plugins/bindusms/assets/js/bindusms-admin.js

HTML / DOM Fingerprints

CSS Classes
bindusms-wc-order-notification-settings
FAQ

Frequently Asked Questions about BinduSms