
Dashly Security & Risk Analysis
wordpress.org/plugins/dashlyDashly combines all instruments for marketing automation, sales and communications. Supports WooCommerce 5.x, 6.x, 7.x (tested up to 7.1.0).
Is Dashly Safe to Use in 2026?
Generally Safe
Score 85/100Dashly has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The static analysis of the "dashly" v2.1.1 plugin reveals a generally good security posture with several positive indicators. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points suggests a limited attack surface. Furthermore, the code signals show proper SQL query handling with prepared statements and a high percentage of properly escaped output, mitigating common web vulnerabilities. The plugin also demonstrates awareness of security best practices with a nonce check present.
However, the analysis does highlight a few areas for improvement. The presence of one flow with an unsanitized path in the taint analysis, even if not rated as critical or high severity, warrants attention as it could potentially lead to path traversal or other file system related vulnerabilities depending on the context. Additionally, while the number of file operations and external HTTP requests is low, these are still potential vectors that should be carefully reviewed for any security implications. The lack of capability checks, while not explicitly a vulnerability in this context due to the limited attack surface, is a missed opportunity to enforce granular user permissions and could become a concern if the plugin evolves to handle more sensitive data or actions.
The plugin's vulnerability history is a significant strength, showing zero known CVEs and no recorded common vulnerability types. This indicates a strong track record of secure development and maintenance. In conclusion, "dashly" v2.1.1 presents as a relatively secure plugin with a minimal attack surface and good coding practices for SQL and output handling. The primary areas of concern are the single unsanitized path flow and the absence of capability checks, which are minor points of attention given the overall clean history and limited exposure.
Key Concerns
- Flow with unsanitized path
- Missing capability checks
Dashly Security Vulnerabilities
Dashly Code Analysis
Output Escaping
Data Flow Analysis
Dashly Attack Surface
WordPress Hooks 14
Maintenance & Trust
Dashly Maintenance & Trust
Maintenance Signals
Community Trust
Dashly Alternatives
CartBounty – Save and recover abandoned carts for WooCommerce
woo-save-abandoned-carts
Save abandoned carts and send automated abandoned cart recovery messages. Get more leads, reduce cart abandonment, and increase sales.
Abandoned Cart Reports For WooCommerce
wc-abandoned-carts-by-small-fish-analytics
A simple plugin to see how many carts and which products your customers are abandoning
Spoki – Chat Buttons and WooCommerce Notifications
spoki
WhatsApp full integration for your website! Recover Abandoned Carts, send Order Notifications and add WhatsApp Buttons.
Recapture for WooCommerce
recapture-for-woocommerce
Recapture is the easiest and most effective way to recover abandoned carts and do SMS and email marketing for your WooCommerce store in WordPress.
Cart tracking for WooCommerce
cart-tracking-for-woocommerce
Keep track of what people are adding or removing from their cart. See most added/removed products lists.
Dashly Developer Profile
1 plugin · 60 total installs
How We Detect Dashly
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
<!-- Dashly BEGIN --><!-- Dashly END -->window.dashlyasyncwindow.dashlydashly.settings