Epicwin Plugin Security & Risk Analysis

wordpress.org/plugins/epicwin-subscribers

This plugin allows your blog visitors to subscribe to your blog via email and receive notifications whenever you create a new post.

100 active installs v1.5 PHP + WP 2.9+ Updated Nov 10, 2011
epicwinfeednewslettersubcribesubscribers
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEJun 5, 2025
Safety Verdict

Is Epicwin Plugin Safe to Use in 2026?

Use With Caution

Score 63/100

Epicwin Plugin has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Jun 5, 2025Updated 14yr ago
Risk Assessment

The 'epicwin-subscribers' plugin v1.5 exhibits a mixed security posture. On the positive side, it demonstrates good practices in handling SQL queries, utilizing prepared statements exclusively. There are no external HTTP requests, which generally reduces the attack surface related to external services. The plugin also has a relatively small attack surface in terms of direct entry points like AJAX handlers, REST API routes, and shortcodes.

However, significant concerns arise from the code analysis. The very low percentage of properly escaped output (5%) is a major red flag, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The presence of one taint flow with unsanitized paths and a high severity taint analysis result further reinforces this concern, suggesting that user-controlled data might be processed in an unsafe manner, potentially leading to code injection or other critical issues. The complete lack of nonce checks on any entry points, coupled with only one capability check, leaves the plugin highly susceptible to Cross-Site Request Forgery (CSRF) attacks, especially if any of its functionalities can be triggered by unauthenticated or less privileged users.

The vulnerability history, with one currently unpatched medium severity CVE originating from CSRF, aligns with the findings from the code analysis. The past prevalence of CSRF vulnerabilities suggests a recurring pattern of insufficient protection against malicious requests. While the plugin has no critical or high CVEs and avoids raw SQL, the substantial risk of XSS and CSRF due to poor output escaping and lack of proper authorization/validation mechanisms significantly outweighs its strengths. This plugin requires immediate attention to address these critical security weaknesses.

Key Concerns

  • High risk of XSS due to low output escaping
  • Unsanitized path taint flow (high severity)
  • Missing nonce checks on entry points
  • Unpatched medium severity CVE
  • Limited capability checks
Vulnerabilities
1

Epicwin Plugin Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-28986medium · 4.3Cross-Site Request Forgery (CSRF)

Epicwin Plugin <= 1.5 - Cross-Site Request Forgery to SQL Injection

Jun 5, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Epicwin Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
24 prepared
Unescaped Output
18
1 escaped
Nonce Checks
0
Capability Checks
1
File Operations
5
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared24 total queries

Output Escaping

5% escaped19 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
epicwin_settings_page (epicwin.php:135)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Epicwin Plugin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_initepicwin.php:59
actionwp_headepicwin.php:65
actionadmin_menuepicwin.php:450
actionwp_footerepicwin.php:485
filterpublish_postepicwin.php:558
actioninitepicwin.php:564
Maintenance & Trust

Epicwin Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedNov 10, 2011
PHP min version
Downloads13K

Community Trust

Rating60/100
Number of ratings2
Active installs100
Developer Profile

Epicwin Plugin Developer Profile

Webaholicson

1 plugin · 100 total installs

68
trust score
Avg Security Score
63/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Epicwin Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/epicwin-subscribers/style.css

HTML / DOM Fingerprints

CSS Classes
epicwin-subscriptionwidget_epicwin_widgeterrorserrorsuccess
Data Attributes
name="sub_name"name="sub_email"name="action"value="subscribe"
FAQ

Frequently Asked Questions about Epicwin Plugin