Enroll via IPN Plugin Security & Risk Analysis

wordpress.org/plugins/enroll-via-ipn

With Enroll via IPN you can send a follow up email to your paypal customer and let them opt-in into a product specific customer newsletter.

10 active installs v1.0.0.3 PHP + WP 3.3.1+ Updated May 3, 2012
customer-listcustomer-newsletterfollow-up-emailpaypal-ipnupgrade-notification
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Enroll via IPN Plugin Safe to Use in 2026?

Generally Safe

Score 85/100

Enroll via IPN Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "enroll-via-ipn" plugin v1.0.0.3 presents a mixed security posture. On the positive side, it boasts zero known CVEs and a seemingly small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are directly exposed without authentication. The plugin also utilizes prepared statements for a significant majority of its SQL queries (72%), indicating some effort towards secure database interactions.

However, significant concerns arise from the code analysis. The extremely low percentage of properly escaped output (3%) suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the presence of three taint flows with unsanitized paths, even though they are not classified as critical or high severity in this analysis, is a red flag. Unsanitized paths in taint flows often indicate potential for directory traversal or arbitrary file read/write vulnerabilities. The absence of any nonce checks or capability checks across all entry points, combined with the file operation and external HTTP request signals, amplifies these risks, as these operations might be exploitable without proper authorization.

The plugin's vulnerability history is clean, with no recorded CVEs. This is a strength, but it should not overshadow the critical weaknesses identified in the code analysis. The lack of historical vulnerabilities might be due to the plugin's limited adoption, lack of rigorous security audits, or simply good luck. In conclusion, while the plugin avoids common attack vectors and has a clean history, the severe lack of output escaping and the presence of unsanitized taint flows represent significant and actionable security weaknesses that require immediate attention.

Key Concerns

  • Output escaping is severely lacking (3%)
  • Taint flows with unsanitized paths present
  • No nonce checks implemented
  • No capability checks implemented
  • File operations detected
  • External HTTP requests detected
Vulnerabilities
None known

Enroll via IPN Plugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Enroll via IPN Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
11
28 prepared
Unescaped Output
34
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
1
Bundled Libraries
0

SQL Query Safety

72% prepared39 total queries

Output Escaping

3% escaped35 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
edit_product (EVI_products_setup.php:91)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Enroll via IPN Plugin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuenroll_via_ipn.php:63
actionadmin_initenroll_via_ipn.php:66
actiontemplate_redirectenroll_via_ipn.php:72
filterquery_varsenroll_via_ipn.php:73
Maintenance & Trust

Enroll via IPN Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedMay 3, 2012
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Enroll via IPN Plugin Developer Profile

julius.uhrik

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Enroll via IPN Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/enroll-via-ipn/images/enroll_via_ipn_16x16.png

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Enroll via IPN Plugin