informvisitors Security & Risk Analysis

wordpress.org/plugins/informvisitors

With informvisitors, you can start sending browser push notifications to your clients in less than a minute.Just install the plugin and enjoy.

10 active installs v2.7 PHP + WP 4.5+ Updated Unknown
chrome-push-notificationsfirefox-push-notificationsgcmpush-notificationswebsite-push-notifications
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is informvisitors Safe to Use in 2026?

Generally Safe

Score 100/100

informvisitors has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'informvisitors' plugin v2.7 exhibits a generally strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code signals indicate robust practices in handling SQL queries, with 100% utilizing prepared statements, and the presence of capability checks suggests an awareness of authorization. The lack of any recorded CVEs, critical taint flows, or dangerous functions is a positive indicator.

However, a key area of concern is the low percentage of properly escaped output (31%). This indicates a significant risk of Cross-Site Scripting (XSS) vulnerabilities, where user-supplied data, if not properly sanitized before being displayed, could be used to inject malicious scripts into the WordPress site. While the attack surface is currently small, any future expansion or introduction of user-controlled input without stringent output escaping could expose the site to considerable risk. The lack of nonce checks, although not immediately concerning given the minimal attack surface, could become a weakness if new entry points are added without proper security considerations.

Key Concerns

  • Low percentage of properly escaped output
  • Lack of nonce checks
Vulnerabilities
None known

informvisitors Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

informvisitors Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
4 escaped
Nonce Checks
0
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

31% escaped13 total outputs
Attack Surface

informvisitors Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuadmin\admin-menu.php:26
actionadmin_initadmin\settings-register.php:84
actionwp_headinformvisitors.php:64
Maintenance & Trust

informvisitors Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

informvisitors Developer Profile

atiprashant

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect informvisitors

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
https://www.informvisitors.com/resources/scripts/3.0.0/js/iv.js

HTML / DOM Fingerprints

HTML Comments
<!-- Start informvisitors Code --><!-- End informvisitors Code -->
Data Attributes
id="infv_main"values="informvisitors_username"
JS Globals
loadInfvScriptinfv_main
FAQ

Frequently Asked Questions about informvisitors