Bulk SMS PLugin Security & Risk Analysis

wordpress.org/plugins/bulk-sms

Bulk SMS Plugin enables Wordpress admins to allow their site visitors to send them SMS using SMS Gateway, it also supports auto response

10 active installs v1.0 PHP + WP 2.5+ Updated Mar 30, 2011
bulksmssms
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Bulk SMS PLugin Safe to Use in 2026?

Generally Safe

Score 85/100

Bulk SMS PLugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "bulk-sms" v1.0 plugin exhibits a mixed security posture. On the positive side, it has no recorded vulnerabilities or CVEs, and its SQL queries are all prepared statements, indicating good practices in database interaction. The absence of external HTTP requests and a small attack surface also contribute to a seemingly robust defense. However, significant concerns arise from the static analysis. None of the identified output operations are properly escaped, meaning user-supplied data displayed on the frontend or in administrative interfaces could be vulnerable to cross-site scripting (XSS) attacks. Furthermore, the absence of nonce checks and capability checks on its single shortcode entry point is a critical oversight, leaving it susceptible to unauthorized execution of its functionality, potentially leading to unintended SMS messages being sent or other malicious actions.

Key Concerns

  • 0% of output is properly escaped
  • Shortcode lacks nonce/capability checks
  • Flow with unsanitized paths
Vulnerabilities
None known

Bulk SMS PLugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Bulk SMS PLugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<bulksms_import_admin> (bulksms_import_admin.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Bulk SMS PLugin Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[bulksms] bulksms.php:136
WordPress Hooks 2
actionwp_headbulksms.php:137
actionadmin_menubulksms.php:138
Maintenance & Trust

Bulk SMS PLugin Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedMar 30, 2011
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Bulk SMS PLugin Developer Profile

akshayagarwal

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Bulk SMS PLugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Bulk SMS PLugin