Dialog eSMS Security & Risk Analysis

wordpress.org/plugins/dialog-e-sms

Corporate SMS solution

10 active installs v1.0.0 PHP 7.2+ WP 5.2+ Updated Mar 10, 2023
dialogdialog-esmsesmsmessagingsms
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Dialog eSMS Safe to Use in 2026?

Generally Safe

Score 85/100

Dialog eSMS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "dialog-e-sms" plugin v1.0.0 exhibits a mixed security posture. While it demonstrates strong practices by exclusively using prepared statements for all SQL queries and avoiding file operations and bundled libraries, significant concerns arise from its attack surface and taint analysis. The presence of a single unprotected AJAX handler is a critical vulnerability. This means that an unauthenticated user can trigger this AJAX action, potentially leading to unintended consequences or further exploitation if it interacts with other parts of the system in an insecure manner.

The taint analysis reveals two high-severity flows with unsanitized paths. This indicates that user-supplied input is being processed in a way that could allow for path traversal or other file system manipulation vulnerabilities, despite the absence of direct file operations in the code signals. Combined with the lack of capability checks and nonce checks on the entry points, these unsanitized paths represent a substantial risk. The plugin's clean vulnerability history is a positive sign, suggesting it has not been a target of past exploits or has been developed with reasonable care. However, the current static analysis findings highlight critical oversight in input validation and access control for its entry points, which could easily lead to future vulnerabilities.

In conclusion, the "dialog-e-sms" plugin has strengths in its data handling (SQL prepared statements) and avoidance of common risky practices like bundling libraries. Nevertheless, the unprotected AJAX handler and high-severity unsanitized taint flows, coupled with a complete lack of capability and nonce checks, create a significant security risk. This plugin requires immediate attention to address these critical vulnerabilities before they can be exploited.

Key Concerns

  • Unprotected AJAX handler
  • High severity unsanitized taint flows
  • AJAX handler without nonce check
  • AJAX handler without capability check
  • Unescaped output detected
Vulnerabilities
None known

Dialog eSMS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Dialog eSMS Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
15 prepared
Unescaped Output
6
13 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared15 total queries

Output Escaping

68% escaped19 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
adeona_esms_ajax_handler (Dialog-eSMS.php:165)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Dialog eSMS Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_adeona_esms_plugin_libraryDialog-eSMS.php:161
WordPress Hooks 5
filterplugin_action_linksDialog-eSMS.php:24
actionadmin_menuDialog-eSMS.php:47
actioninitDialog-eSMS.php:159
actionwoocommerce_order_status_changedDialog-eSMS.php:294
actionwoocommerce_new_customer_note_notificationDialog-eSMS.php:297
Maintenance & Trust

Dialog eSMS Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedMar 10, 2023
PHP min version7.2
Downloads795

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Dialog eSMS Developer Profile

Adeona Technologies

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Dialog eSMS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dialog-e-sms/assets/css/new_bootstrap.min.css/wp-content/plugins/dialog-e-sms/assets/js/jquery.validate.min.js/wp-content/plugins/dialog-e-sms/assets/js/bootstrap.min.js/wp-content/plugins/dialog-e-sms/assets/js/esms_script.js
Script Paths
/wp-content/plugins/dialog-e-sms/assets/js/jquery.validate.min.js/wp-content/plugins/dialog-e-sms/assets/js/bootstrap.min.js/wp-content/plugins/dialog-e-sms/assets/js/esms_script.js
Version Parameters
dialog-e-sms/assets/css/new_bootstrap.min.css?ver=dialog-e-sms/assets/js/jquery.validate.min.js?ver=dialog-e-sms/assets/js/bootstrap.min.js?ver=dialog-e-sms/assets/js/esms_script.js?ver=

HTML / DOM Fingerprints

JS Globals
esmsajaxurl
FAQ

Frequently Asked Questions about Dialog eSMS