Full Screen Popup Security & Risk Analysis

wordpress.org/plugins/full-screen-popup

Create a javascript based, light-weight and non-annoying responsive full screen popup box in your blog.

20 active installs v1.2.2 PHP + WP 2.8+ Updated Jun 19, 2018
full-page-popupfull-screen-popfull-screen-popupfull-window-popuppopup
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Full Screen Popup Safe to Use in 2026?

Generally Safe

Score 85/100

Full Screen Popup has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The 'full-screen-popup' plugin v1.2.2 exhibits a mixed security posture. While it has a clean vulnerability history with no recorded CVEs, the static analysis reveals several areas of concern. A significant risk lies in its attack surface, specifically the two AJAX handlers that lack authentication checks. This could potentially allow unauthenticated users to trigger plugin functionalities, leading to unintended behavior or further exploitation.

The code analysis also flags two SQL queries that are not using prepared statements, which is a critical security oversight. Although no taint analysis found critical or high severity issues, the lack of input sanitization on the AJAX handlers combined with raw SQL queries presents a potential pathway for SQL injection vulnerabilities. The low percentage of properly escaped output (14%) further amplifies the risk of cross-site scripting (XSS) vulnerabilities.

Despite the clean CVE history suggesting past diligence, the current analysis indicates a need for immediate attention to secure the AJAX endpoints and implement prepared statements for all SQL queries. The strengths of the plugin include the absence of dangerous functions and file operations, and the presence of nonces and capability checks. However, these are overshadowed by the identified weaknesses, particularly the unprotected entry points and the insecure handling of database queries.

Key Concerns

  • Unprotected AJAX handlers
  • SQL queries without prepared statements
  • Low percentage of properly escaped output
  • Limited capability checks
Vulnerabilities
None known

Full Screen Popup Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Full Screen Popup Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
139
22 escaped
Nonce Checks
5
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

TinyMCE

SQL Query Safety

0% prepared2 total queries

Output Escaping

14% escaped161 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
<fullscreen-settings> (admin\fullscreen-settings.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Full Screen Popup Attack Surface

Entry Points5
Unprotected2

AJAX Handlers 3

authwp_ajax_xyz_fsp_ajax_backlinkadmin\ajax-backlink.php:3
authwp_ajax_xyz_fsp_actioncreate-fullscreen.php:36
noprivwp_ajax_xyz_fsp_actioncreate-fullscreen.php:37

Shortcodes 2

[xyz_fsp_default_code] shortcode-handler.php:10
[xyz_fsp_default_code] shortcode-handler.php:15
WordPress Hooks 13
actionadmin_noticesadmin\admin-notices.php:65
actionadmin_menuadmin\menu.php:4
actionadmin_enqueue_scriptsadmin\menu.php:51
filtertiny_mce_before_initadmin\tinymce_filters.php:13
filterformat_for_editoradmin\tinymce_filters.php:28
actionafter_wp_tiny_mceadmin\tinymce_filters.php:53
actionget_footercreate-fullscreen.php:6
actionget_footercreate-fullscreen.php:10
actionwpcreate-fullscreen.php:17
actionwp_footerfull-screen-popup.php:51
filterquery_varsfull-screen-popup.php:65
actionparse_requestfull-screen-popup.php:76
filterplugin_row_metaxyz-functions.php:18
Maintenance & Trust

Full Screen Popup Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJun 19, 2018
PHP min version
Downloads35K

Community Trust

Rating80/100
Number of ratings2
Active installs20
Developer Profile

Full Screen Popup Developer Profile

f1logic

15 plugins · 142K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
352 days
View full developer profile
Detection Fingerprints

How We Detect Full Screen Popup

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/full-screen-popup/css/style.css/wp-content/plugins/full-screen-popup/js/notice.js/wp-content/plugins/full-screen-popup/fsp_request.js
Script Paths
/wp-content/plugins/full-screen-popup/js/notice.js/wp-content/plugins/full-screen-popup/fsp_request.js

HTML / DOM Fingerprints

CSS Classes
xyz_fsp_container
Data Attributes
xyz_fsp_ajax_object
JS Globals
xyz_fsp_ajax_object
FAQ

Frequently Asked Questions about Full Screen Popup