
Enroll via IPN Plugin Security & Risk Analysis
wordpress.org/plugins/enroll-via-ipnWith Enroll via IPN you can send a follow up email to your paypal customer and let them opt-in into a product specific customer newsletter.
Is Enroll via IPN Plugin Safe to Use in 2026?
Generally Safe
Score 85/100Enroll via IPN Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "enroll-via-ipn" plugin v1.0.0.3 presents a mixed security posture. On the positive side, it boasts zero known CVEs and a seemingly small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are directly exposed without authentication. The plugin also utilizes prepared statements for a significant majority of its SQL queries (72%), indicating some effort towards secure database interactions.
However, significant concerns arise from the code analysis. The extremely low percentage of properly escaped output (3%) suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the presence of three taint flows with unsanitized paths, even though they are not classified as critical or high severity in this analysis, is a red flag. Unsanitized paths in taint flows often indicate potential for directory traversal or arbitrary file read/write vulnerabilities. The absence of any nonce checks or capability checks across all entry points, combined with the file operation and external HTTP request signals, amplifies these risks, as these operations might be exploitable without proper authorization.
The plugin's vulnerability history is clean, with no recorded CVEs. This is a strength, but it should not overshadow the critical weaknesses identified in the code analysis. The lack of historical vulnerabilities might be due to the plugin's limited adoption, lack of rigorous security audits, or simply good luck. In conclusion, while the plugin avoids common attack vectors and has a clean history, the severe lack of output escaping and the presence of unsanitized taint flows represent significant and actionable security weaknesses that require immediate attention.
Key Concerns
- Output escaping is severely lacking (3%)
- Taint flows with unsanitized paths present
- No nonce checks implemented
- No capability checks implemented
- File operations detected
- External HTTP requests detected
Enroll via IPN Plugin Security Vulnerabilities
Enroll via IPN Plugin Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Enroll via IPN Plugin Attack Surface
WordPress Hooks 4
Maintenance & Trust
Enroll via IPN Plugin Maintenance & Trust
Maintenance Signals
Community Trust
Enroll via IPN Plugin Alternatives
FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
wp-marketing-automations
Recover lost revenue with Cart Abandonment Recovery for WooCommerce. Increase retention with Post Purchase Follow-Up Emails.
ShopMagic – email automation
shopmagic-for-woocommerce
Flexible email automation and workflows triggered by customer and site events.
Product Customer List for WooCommerce
wc-product-customer-list
Display a list of customers who bought a specific product at the bottom of the product edit page in WooCommerce and send them e-mails.
PiWeb Export Customers Users & Guest customer to CSV for WooCommerce
export-woocommerce-customer-list
Export WooCommerce customer list CSV, export WooCommerce guest customer list CSV, export WordPress users CSV, Product Customer List for WooCommerce
Email Reminders
email-reminders
Sending friendly email reminders or follow-up emails based on custom rules.
Enroll via IPN Plugin Developer Profile
1 plugin · 10 total installs
How We Detect Enroll via IPN Plugin
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/enroll-via-ipn/images/enroll_via_ipn_16x16.png