EasySMS Security & Risk Analysis

wordpress.org/plugins/easysms

EasySMS provides an easy way for readers to subscribe to SMS updates and for admins to send SMS messages to groups. Auto SMS with post publishing.

10 active installs v2.0.7.2 PHP + WP 2.8+ Updated Oct 10, 2009
ajaxmessagingmobilesmstxt
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EasySMS Safe to Use in 2026?

Generally Safe

Score 85/100

EasySMS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The "easysms" plugin v2.0.7.2 presents a mixed security profile. On the positive side, the static analysis reveals a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that could be directly exploited without authentication. Furthermore, there are no known CVEs associated with this plugin, and no critical or high severity taint flows were detected, suggesting a generally cautious development approach.

However, significant concerns arise from the code analysis regarding output escaping and SQL query handling. The fact that 0% of the 7 identified outputs are properly escaped is a major red flag, indicating a high likelihood of cross-site scripting (XSS) vulnerabilities. Additionally, only 25% of the SQL queries utilize prepared statements, leaving 75% potentially vulnerable to SQL injection attacks. The absence of nonce checks on any entry points, combined with only two capability checks, further weakens the plugin's defenses against unauthorized actions.

While the lack of historical vulnerabilities is encouraging, it doesn't negate the immediate risks identified in the current code. The plugin exhibits good practice in limiting its attack surface but falls short in fundamental security measures like output sanitization and secure database interaction. Therefore, despite a clean vulnerability history, the identified coding practices pose a substantial risk to users.

Key Concerns

  • Output escaping is not used
  • SQL queries are not consistently prepared
  • No nonce checks on entry points
Vulnerabilities
None known

EasySMS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

EasySMS Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
1 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
4
External Requests
0
Bundled Libraries
0

SQL Query Safety

25% prepared4 total queries

Output Escaping

0% escaped7 total outputs
Attack Surface

EasySMS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionpublish_posteasysms.php:50
actionadmin_menueasysms.php:51
actionadmin_headeasysms.php:52
actionwp_headeasysms.php:53
actioneasysms_formeasysms.php:54
filterthe_contenteasysms.php:55
actionwidgets_initeasysms.php:56
filterquery_varseasysms.php:58
actiontemplate_redirecteasysms.php:72
Maintenance & Trust

EasySMS Maintenance & Trust

Maintenance Signals

WordPress version tested2.8
Last updatedOct 10, 2009
PHP min version
Downloads25K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

EasySMS Developer Profile

Brian Fegter

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect EasySMS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/easysms/css/easysms.css/wp-content/plugins/easysms/css/easysms_admin.css/wp-content/plugins/easysms/js/easysms.js
Script Paths
/wp-content/plugins/easysms/js/easysms.js
Version Parameters
easysms/style.css?ver=easysms/css/easysms.css?ver=easysms/css/easysms_admin.css?ver=easysms/js/easysms.js?ver=

HTML / DOM Fingerprints

CSS Classes
easysmsDiveasysms_widget
Data Attributes
data-easysms-settings
JS Globals
easysms
Shortcode Output
<div id='easysmsDiv'><div class=
FAQ

Frequently Asked Questions about EasySMS