Integration Sendy for Elementor Security & Risk Analysis

wordpress.org/plugins/integration-sendy-elementor

Easily connect Elementor Pro forms to Sendy and automatically grow your email list with just a few clicks—no third-party tools required.

40 active installs v1.0 PHP 7.2+ WP 5.0+ Updated Mar 4, 2025
elementor-form-integrationemail-automationemail-marketingsendysubscribe-forms
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Integration Sendy for Elementor Safe to Use in 2026?

Generally Safe

Score 92/100

Integration Sendy for Elementor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin "integration-sendy-elementor" v1.0 exhibits a strong initial security posture based on the static analysis. It demonstrates excellent practices by avoiding dangerous functions, utilizing prepared statements for all SQL queries, and ensuring proper output escaping for all identified outputs. The absence of file operations and critical taint flows further contributes to its secure design. Furthermore, the lack of any known historical vulnerabilities or CVEs suggests a history of responsible development and patching. The plugin's limited attack surface, with no registered AJAX handlers, REST API routes, shortcodes, or cron events, significantly reduces the potential entry points for attackers.

However, there are a few areas for improvement that prevent a perfect security score. The most notable concern is the complete absence of nonce checks and capability checks across all identified code signals. While the attack surface is currently zero, this oversight leaves the plugin vulnerable if new entry points are introduced or if the existing functionality relies on implicit trust. Additionally, the presence of an external HTTP request without specific details on its handling warrants attention to ensure it doesn't introduce vulnerabilities like SSRF. Overall, the plugin is well-developed with good security fundamentals, but the lack of explicit authorization checks on potential future entry points is a notable weakness.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
  • External HTTP Request without details
Vulnerabilities
None known

Integration Sendy for Elementor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Integration Sendy for Elementor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
11 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped11 total outputs
Attack Surface

Integration Sendy for Elementor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuintegration-sendy-elementor.php:24
actionadmin_initintegration-sendy-elementor.php:25
actionelementor_pro/forms/new_recordintegration-sendy-elementor.php:26
Maintenance & Trust

Integration Sendy for Elementor Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedMar 4, 2025
PHP min version7.2
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

Integration Sendy for Elementor Developer Profile

Chris White

1 plugin · 40 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Integration Sendy for Elementor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<h1>Integration Sendy for Elementor<form method="post" action="options.php"<label for="
FAQ

Frequently Asked Questions about Integration Sendy for Elementor