Blimply Security & Risk Analysis

wordpress.org/plugins/blimply

Blimply will allow you to send push notifications to your mobile users utilizing Urban Airship API.

900 active installs v0.4 PHP + WP 3.3+ Updated Apr 3, 2013
iphonenotificationspushurban-airshipwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Blimply Safe to Use in 2026?

Generally Safe

Score 85/100

Blimply has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "blimply" v0.4 plugin exhibits a generally strong security posture based on the provided static analysis and vulnerability history. It demonstrates good practices by not exposing any REST API routes, shortcodes, or cron events, and its single AJAX handler includes a nonce check. Furthermore, all SQL queries are properly prepared, and there are no file operations or external HTTP requests, significantly reducing potential attack vectors.

However, a notable concern arises from the output escaping. With 18 outputs analyzed, only 39% are properly escaped. This indicates a significant risk of Cross-Site Scripting (XSS) vulnerabilities, as unsanitized user-supplied data could be rendered directly in the browser. While there's no recorded vulnerability history, this doesn't guarantee future safety, especially given the XSS-related weaknesses.

In conclusion, "blimply" v0.4 has a solid foundation with its controlled attack surface and secure data handling for SQL. The primary weakness lies in its output escaping, which requires immediate attention. The absence of historical vulnerabilities is a positive sign but should not be relied upon as a guarantee of continued security, especially with the identified output sanitation issues.

Key Concerns

  • Output escaping is not consistently applied (39% proper)
Vulnerabilities
None known

Blimply Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Blimply Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
7 escaped
Nonce Checks
2
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

39% escaped18 total outputs
Attack Surface

Blimply Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_blimply-send-pushblimply.php:55
WordPress Hooks 9
actionadmin_initblimply.php:46
actionsave_postblimply.php:47
actionadd_meta_boxesblimply.php:48
actionupdate_option_blimply_optionsblimply.php:49
actionregister_taxonomyblimply.php:50
actioncreate_termblimply.php:51
actioninitblimply.php:52
actionwp_dashboard_setupblimply.php:53
actionadmin_enqueue_scriptsblimply.php:54
Maintenance & Trust

Blimply Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedApr 3, 2013
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs900
Developer Profile

Blimply Developer Profile

Rinat

1 plugin · 900 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Blimply

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/blimply/lib/css/blimply.css/wp-content/plugins/blimply/lib/js/blimply.js
Script Paths
/wp-content/plugins/blimply/lib/js/blimply.js
Version Parameters
blimply.css?ver=blimply.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-blimply_push_sentdata-blimply_push_tagdata-blimply_push_alertdata-blimply_noncedata-blimply_push_tag_iddata-blimply_push_alert_id
JS Globals
Blimply
FAQ

Frequently Asked Questions about Blimply