
Icegram Engage – Popups, Optins, CTAs & Lead Generation Security & Risk Analysis
wordpress.org/plugins/icegramCreate high-converting popups, email optins, and CTAs in minutes. Capture leads, grow your email list, and convert visitors into customers—without cod …
Is Icegram Engage – Popups, Optins, CTAs & Lead Generation Safe to Use in 2026?
Generally Safe
Score 92/100Icegram Engage – Popups, Optins, CTAs & Lead Generation has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.
The "icegram" plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices in SQL query handling with a high percentage of prepared statements and a robust number of nonce and capability checks. The majority of output is properly escaped, and it has no currently unpatched CVEs, which is a significant strength. However, there are several areas of concern. The presence of 14 AJAX handlers, with 3 lacking authentication checks, creates a notable attack surface for unauthorized actions. Furthermore, the use of the dangerous `unserialize` function, even if not directly linked to a critical taint flow in this analysis, always presents a risk of arbitrary code execution if attacker-controlled data is passed to it. The vulnerability history reveals a significant number of past medium and high severity issues, including missing authorization and CSRF. While the plugin has a recent security patch (implied by the 2026 date, though this seems like a future date and might be a typo), the sheer volume of past vulnerabilities suggests a history of security oversights. The taint analysis shows no critical or high severity flows, which is reassuring, but the two flows with unsanitized paths warrant attention, as they could lead to vulnerabilities if exploited under certain conditions. The presence of bundled libraries like Select2 also introduces a dependency risk if those libraries are outdated or have known vulnerabilities.
In conclusion, while "icegram" v3.1.39 has made strides in secure coding practices, particularly with prepared statements and output escaping, its past vulnerability record and the identified weaknesses in its attack surface (unauthenticated AJAX handlers, `unserialize` function) prevent it from being considered highly secure. The plugin requires ongoing vigilance and a commitment to addressing identified vulnerabilities promptly. Users should be aware of the potential risks associated with unauthenticated entry points and the inherent dangers of deserialization functions.
Key Concerns
- Unprotected AJAX handlers
- Dangerous unserialize function
- Flows with unsanitized paths
- Past high severity vulnerabilities
- Past medium severity vulnerabilities
- Bundled libraries (potential risk)
Icegram Engage – Popups, Optins, CTAs & Lead Generation Security Vulnerabilities
CVEs by Year
Severity Breakdown
18 total CVEs
Icegram <= 3.1.35 - Missing Authorization
Icegram Engage <= 3.1.31 - Authenticated (Administrator+) Stored Cross-Site Scripting
Icegram Engage <= 3.1.31 - Authenticated (Administrator+) Stored Cross-Site Scripting
Icegram <= 3.1.31 - Authenticated (Contributor+) Stored Cross-Site Scripting
Icegram Engage <= 3.1.31 - Authenticated (Author+) Stored Cross-Site Scripting
Icegram <= 3.1.25 - Authenticated (Contributor+) Stored Cross-Site Scripting
Icegram <= 3.1.24 - Missing Authorization
Icegram <= 3.1.24 - Missing Authorization to Unauthenticated Message Duplication
Icegram <= 3.1.21 - Missing Authorization
Icegram <= 3.1.18 - Cross-Site Request Forgery via save_campaign_preview
Icegram <= 3.1.19 - Authenticated (Contributor+) Stored Cross-Site Scripting via Campaign Message
Icegram Engage <= 3.1.11 - Reflected Cross-Site Scripting
Icegram Engage <= 2.1.7 - Cross-Site Scripting
Icegram <= 2.0.4 - Reflected Cross-Site Scripting via message_id
Icegram <= 2.0.2 - Authenticated Stored Cross-Site Scripting
Icegram <= 1.10.28.2 - Cross-Site Scripting
Icegram <= 1.9.18 - Cross-Site Request Forgery
Icegram <= 1.9.18 - Cross-Site Scripting
Icegram Engage – Popups, Optins, CTAs & Lead Generation Release Timeline
Icegram Engage – Popups, Optins, CTAs & Lead Generation Code Analysis
Dangerous Functions Found
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
Icegram Engage – Popups, Optins, CTAs & Lead Generation Attack Surface
AJAX Handlers 14
Shortcodes 2
WordPress Hooks 115
Maintenance & Trust
Icegram Engage – Popups, Optins, CTAs & Lead Generation Maintenance & Trust
Maintenance Signals
Community Trust
Icegram Engage – Popups, Optins, CTAs & Lead Generation Alternatives
OptinAble – Popup Builder, Stickybars, Slide-in, WordPress Lead Generation & Email List Building
optinable
OptinAble The ultimate Free WP plugin for collecting email subscribers. With our easy-to-use interface, and built-in templates, you can create beautif …
Popup Builder – Create highly converting, mobile friendly marketing popups.
popup-builder
Increase Sales, Lead Generation, Conversion rates and receive good Call to Action rates with smart WordPress popup plugin.
Brave Popup Builder – Popup, Optins, Lead Generation, Survey & Interactive Content
brave-popup-builder
The best drag-and-drop Popup Builder for WordPress. Create Popups, exit-intent popups, slide-ins, and lead generation forms & Woocommerce popups i …
Slick Popup: Contact Form 7 Popup Plugin
slick-popup
A lightweight plugin that converts a Contact Form 7 form into a customizable pop-up form which is slick, beautiful and responsive to different screen …
Keap Official Opt-in Forms
infusionsoft-official-opt-in-forms
Build your email subscriber list from visitors to your WordPress website with Keap's Official Opt-in Forms plugin.
Icegram Engage – Popups, Optins, CTAs & Lead Generation Developer Profile
8 plugins · 74K total installs
How We Detect Icegram Engage – Popups, Optins, CTAs & Lead Generation
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/icegram/lite/css//wp-content/plugins/icegram/lite/js/HTML / DOM Fingerprints
icegram-dialogig_campaignig_messageicegram-frontend<!-- Icegram Engage Plugin (Lite) --><!-- Icegram Engage --><!-- Do not edit this code unless you know what you are doing -->data-icegram-campaignIcegram/wp-json/icegram/