Flow Systems Webhook Actions Security & Risk Analysis

wordpress.org/plugins/flowsystems-webhook-actions

Reliable WordPress webhooks for automation workflows with retries, delivery logs, event IDs, queue processing, and replayable webhook events.

0 active installs v1.2.1 PHP 8.0+ WP 6.0+ Updated Mar 7, 2026
apiautomationintegrationn8nwebhook
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Flow Systems Webhook Actions Safe to Use in 2026?

Generally Safe

Score 100/100

Flow Systems Webhook Actions has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 27d ago
Risk Assessment

The "flowsystems-webhook-actions" plugin v1.3.2 exhibits a mixed security posture. On the positive side, the code demonstrates good practices regarding output escaping, with 100% of outputs being properly escaped. Furthermore, a significant majority (76%) of SQL queries utilize prepared statements, reducing the risk of SQL injection. The plugin also has no recorded historical vulnerabilities, suggesting a generally stable codebase.

However, there are significant security concerns stemming from the static analysis. The most alarming finding is that all 4 identified REST API routes lack permission callbacks. This creates a substantial attack surface, as any unauthenticated user could potentially interact with these endpoints. The absence of nonce checks on any AJAX handlers, although there are none without auth checks, and the lack of explicit capability checks in several areas are also worrying. The absence of taint analysis results is not necessarily positive or negative, as it could indicate the analysis tool couldn't find flows or that the plugin is structured in a way that makes it difficult to analyze with this method.

In conclusion, while the plugin has positive attributes like excellent output escaping and a clean vulnerability history, the unprotected REST API routes represent a critical vulnerability. The lack of robust authentication and authorization mechanisms for these entry points is a significant risk that needs immediate attention. The absence of nonce checks on AJAX, even with zero unauthenticated handlers, indicates a potential oversight in security practices.

Key Concerns

  • REST API routes without permission callbacks
  • No nonce checks on AJAX handlers
  • Limited capability checks
Vulnerabilities
None known

Flow Systems Webhook Actions Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Flow Systems Webhook Actions Code Analysis

Dangerous Functions
0
Raw SQL Queries
26
82 prepared
Unescaped Output
0
19 escaped
Nonce Checks
0
Capability Checks
5
File Operations
2
External Requests
1
Bundled Libraries
0

SQL Query Safety

76% prepared108 total queries

Output Escaping

100% escaped19 total outputs
Attack Surface
4 unprotected

Flow Systems Webhook Actions Attack Surface

Entry Points4
Unprotected4

REST API Routes 4

GET/wp-json/fswa/v1/dispatcher/processsrc\Controllers\DispatcherController.php:40
GET/wp-json/fswa/v1/cron/processsrc\Controllers\DispatcherController.php:57
GET/wp-json/fswa/v1/cron/regenerate-tokensrc\Controllers\DispatcherController.php:78
GET/wp-json/fswa/v1/cron/infosrc\Controllers\DispatcherController.php:87
WordPress Hooks 12
actionplugins_loadedflowsystems-webhook-actions.php:27
filtercron_schedulessrc\Activation.php:170
filtercron_schedulessrc\App.php:49
actionfswa_cleanup_logssrc\App.php:61
actionadmin_menusrc\Controllers\AdminController.php:19
actionadmin_enqueue_scriptssrc\Controllers\AdminController.php:20
actionrest_api_initsrc\Controllers\AdminController.php:21
actionadmin_noticessrc\Controllers\AdminController.php:22
filterscript_loader_tagsrc\Controllers\AdminController.php:95
filterscript_loader_tagsrc\Controllers\AdminController.php:121
actionrest_api_initsrc\Controllers\DispatcherController.php:29
actionfswa_process_queuesrc\Services\HooksHandler.php:38

Scheduled Events 3

fswa_cleanup_logs
fswa_process_queue
fswa_process_queue
Maintenance & Trust

Flow Systems Webhook Actions Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 7, 2026
PHP min version8.0
Downloads409

Community Trust

Rating100/100
Number of ratings2
Active installs0
Developer Profile

Flow Systems Webhook Actions Developer Profile

mateuszflowsystems

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Flow Systems Webhook Actions

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/flowsystems-webhook-actions/admin/dist/assets/index-XXXXXXXX.css/wp-content/plugins/flowsystems-webhook-actions/admin/dist/assets/index-XXXXXXXX.js
Script Paths
/wp-content/plugins/flowsystems-webhook-actions/admin/dist/assets/index-XXXXXXXX.js
Version Parameters
flowsystems-webhook-actions/admin/dist/assets/index-XXXXXXXX.js?ver=flowsystems-webhook-actions/admin/dist/assets/index-XXXXXXXX.css?ver=

HTML / DOM Fingerprints

CSS Classes
fswa-app
JS Globals
fswaSettings
REST Endpoints
/fswa/v1/webhooks/fswa/v1/logs/fswa/v1/triggers/fswa/v1/settings/fswa/v1/queue/fswa/v1/health/fswa/v1/schemas/fswa/v1/tokens
FAQ

Frequently Asked Questions about Flow Systems Webhook Actions