Choyal Subscription Popup – MailChimp Support Security & Risk Analysis

wordpress.org/plugins/choyal-subscription-popup

Choyal Subscription Popup fully customizable popup. Full control over popup heading, text, popup background overlay and background image.

0 active installs v2.0 PHP + WP 4.7+ Updated Jun 10, 2017
mailchimpmailchimp-list-syncpopupsubscriber-databasesubscription
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Choyal Subscription Popup – MailChimp Support Safe to Use in 2026?

Generally Safe

Score 85/100

Choyal Subscription Popup – MailChimp Support has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "choyal-subscription-popup" v2.0 plugin demonstrates some positive security practices, including a complete absence of known vulnerabilities (CVEs) and no reported past security issues. Furthermore, all identified entry points, including AJAX handlers, shortcodes, REST API routes, and cron events, appear to have proper authorization and capability checks, along with robust nonce checks for AJAX requests. The taint analysis also indicates no critical or high severity flows with unsanitized paths. This suggests a generally good security posture for this version.

However, there are a few areas that warrant attention. The presence of the `unserialize` function is a significant code signal that could be a potential risk if user-supplied data is directly passed to it without proper sanitization. Additionally, the fact that 100% of SQL queries are not using prepared statements is a concern, as this can lead to SQL injection vulnerabilities. While the taint analysis found no current issues, the potential for exploitation exists with these raw SQL queries. The proper output escaping is reasonably high at 77%, but the remaining 23% could still pose a risk for cross-site scripting (XSS) vulnerabilities if user-controllable data is involved.

In conclusion, while "choyal-subscription-popup" v2.0 shows strengths in its lack of known vulnerabilities and comprehensive checks on entry points, the use of `unserialize` and the complete absence of prepared statements for SQL queries represent notable weaknesses. Addressing these specific code signals should be a priority to further strengthen the plugin's security.

Key Concerns

  • Dangerous function 'unserialize' found
  • SQL queries not using prepared statements
  • Output not properly escaped (23%)
Vulnerabilities
None known

Choyal Subscription Popup – MailChimp Support Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Choyal Subscription Popup – MailChimp Support Code Analysis

Dangerous Functions
9
Raw SQL Queries
9
0 prepared
Unescaped Output
20
67 escaped
Nonce Checks
8
Capability Checks
7
File Operations
0
External Requests
3
Bundled Libraries
0

Dangerous Functions Found

unserialize<option value=""<?php if( is_array( unserialize( get_option('csp-show-popup-pages') ) ) && in_array(csp-settings.php:36
unserialize<option value=""<?php if( is_array( unserialize( get_option('csp-show-popup-pages') ) ) && in_array(csp-settings.php:36
unserialize<option value="home-homepage" <?php if( is_array( unserialize( get_option('csp-show-popup-pages') ) csp-settings.php:38
unserialize<option value="home-homepage" <?php if( is_array( unserialize( get_option('csp-show-popup-pages') ) csp-settings.php:38
unserialize<option value="archive-<?php echo $cspPostType->name; ?>" <?php if( is_array( unserialize( get_optiocsp-settings.php:46
unserialize<option value="archive-<?php echo $cspPostType->name; ?>" <?php if( is_array( unserialize( get_optiocsp-settings.php:46
unserialize<option value="page-<?php echo $singlePage->ID; ?>" <?php if( is_array( unserialize( get_option('cspcsp-settings.php:52
unserialize<option value="page-<?php echo $singlePage->ID; ?>" <?php if( is_array( unserialize( get_option('cspcsp-settings.php:52
unserialize$aryCspShowOnPages = unserialize( get_option('csp-show-popup-pages') );plugin.php:972

SQL Query Safety

0% prepared9 total queries

Output Escaping

77% escaped87 total outputs
Data Flows
All sanitized

Data Flow Analysis

5 flows
csp_subscribers_load_more (plugin.php:443)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Choyal Subscription Popup – MailChimp Support Attack Surface

Entry Points7
Unprotected0

AJAX Handlers 7

noprivwp_ajax_csp_submitplugin.php:288
authwp_ajax_csp_submitplugin.php:289
authwp_ajax_csp_subscribers_load_moreplugin.php:477
authwp_ajax_csp_admin_add_subscriberplugin.php:779
authwp_ajax_csp_admin_delete_subscriberplugin.php:833
authwp_ajax_csp_admin_bulk_delete_subscribersplugin.php:898
authwp_ajax_csp_search_subscribersplugin.php:960
WordPress Hooks 5
actionwp_enqueue_scriptsplugin.php:43
actionwp_enqueue_scriptsplugin.php:44
actionwp_footerplugin.php:135
actionwp_headplugin.php:184
actionadmin_menuplugin.php:365
Maintenance & Trust

Choyal Subscription Popup – MailChimp Support Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJun 10, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Choyal Subscription Popup – MailChimp Support Developer Profile

Girdhari Choyal

4 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Choyal Subscription Popup – MailChimp Support

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/choyal-subscription-popup/assets/css/style.css/wp-content/plugins/choyal-subscription-popup/assets/js/jquery.validate.min.js/wp-content/plugins/choyal-subscription-popup/assets/js/script.js
Script Paths
/wp-content/plugins/choyal-subscription-popup/assets/js/jquery.validate.min.js/wp-content/plugins/choyal-subscription-popup/assets/js/script.js
Version Parameters
choyal-subscription-popup/assets/css/style.css?ver=choyal-subscription-popup/assets/js/jquery.validate.min.js?ver=choyal-subscription-popup/assets/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
csp_subscribe_btncsp_btn_img_iconcsp_overlaycsp_modelcsp_contentcsp_closecsp_api_msgcsp-popup-heading+9 more
Data Attributes
id="email-subscription-form"name="csp_fname"name="csp_lname"name="csp_email"name="csp_submit"
JS Globals
csp_ajax
REST Endpoints
/wp-json/csp_submit
FAQ

Frequently Asked Questions about Choyal Subscription Popup – MailChimp Support