Dashly Security & Risk Analysis

wordpress.org/plugins/dashly

Dashly combines all instruments for marketing automation, sales and communications. Supports WooCommerce 5.x, 6.x, 7.x (tested up to 7.1.0).

60 active installs v2.1.1 PHP + WP 4.2+ Updated Nov 29, 2022
abandoned-cartscustomer-trackingdashlylead-collectionwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Dashly Safe to Use in 2026?

Generally Safe

Score 85/100

Dashly has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The static analysis of the "dashly" v2.1.1 plugin reveals a generally good security posture with several positive indicators. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points suggests a limited attack surface. Furthermore, the code signals show proper SQL query handling with prepared statements and a high percentage of properly escaped output, mitigating common web vulnerabilities. The plugin also demonstrates awareness of security best practices with a nonce check present.

However, the analysis does highlight a few areas for improvement. The presence of one flow with an unsanitized path in the taint analysis, even if not rated as critical or high severity, warrants attention as it could potentially lead to path traversal or other file system related vulnerabilities depending on the context. Additionally, while the number of file operations and external HTTP requests is low, these are still potential vectors that should be carefully reviewed for any security implications. The lack of capability checks, while not explicitly a vulnerability in this context due to the limited attack surface, is a missed opportunity to enforce granular user permissions and could become a concern if the plugin evolves to handle more sensitive data or actions.

The plugin's vulnerability history is a significant strength, showing zero known CVEs and no recorded common vulnerability types. This indicates a strong track record of secure development and maintenance. In conclusion, "dashly" v2.1.1 presents as a relatively secure plugin with a minimal attack surface and good coding practices for SQL and output handling. The primary areas of concern are the single unsanitized path flow and the absence of capability checks, which are minor points of attention given the overall clean history and limited exposure.

Key Concerns

  • Flow with unsanitized path
  • Missing capability checks
Vulnerabilities
None known

Dashly Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Dashly Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
28 escaped
Nonce Checks
1
Capability Checks
0
File Operations
3
External Requests
2
Bundled Libraries
0

Output Escaping

93% escaped30 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
<class-dashlyhooks> (includes\class-dashlyhooks.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Dashly Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
actioninitdashly.php:24
actionadmin_menuincludes\class-dashlybase.php:49
actionwp_enqueue_scriptsincludes\class-dashlybase.php:51
actionwp_loginincludes\class-dashlybase.php:53
actionwp_footerincludes\class-dashlybase.php:54
actionwoocommerce_after_single_productincludes\class-dashlybase.php:56
actionwoocommerce_after_cartincludes\class-dashlybase.php:63
actionwoocommerce_add_to_cartincludes\class-dashlybase.php:65
actionwoocommerce_ajax_added_to_cartincludes\class-dashlybase.php:72
actionwoocommerce_before_checkout_formincludes\class-dashlybase.php:80
actionwoocommerce_checkout_order_processedincludes\class-dashlybase.php:87
actionwoocommerce_order_status_changedincludes\class-dashlybase.php:95
actionwoocommerce_thankyouincludes\class-dashlybase.php:96
actionadmin_initincludes\class-dashlybase.php:126
Maintenance & Trust

Dashly Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedNov 29, 2022
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs60
Developer Profile

Dashly Developer Profile

dashlyapp

1 plugin · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Dashly

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- Dashly BEGIN --><!-- Dashly END -->
JS Globals
window.dashlyasyncwindow.dashlydashly.settings
FAQ

Frequently Asked Questions about Dashly