Invite Friends Security & Risk Analysis

wordpress.org/plugins/invite-friends

This plugin give the ability to anyone how registered to your blog, to invite more people, even if the registration is closed.

10 active installs v0.4 PHP + WP 2.3+ Updated Aug 5, 2008
dashboarde-mailregistrationsidebar
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Invite Friends Safe to Use in 2026?

Generally Safe

Score 85/100

Invite Friends has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The 'invite-friends' plugin v0.4 exhibits a mixed security posture. On the positive side, it has a very small attack surface with no registered AJAX handlers, REST API routes, shortcodes, or cron events. This significantly limits potential entry points for attackers. The absence of bundled libraries and external HTTP requests is also a good practice. However, the code analysis reveals significant concerns regarding data sanitization and database interaction. All identified SQL queries are not using prepared statements, which is a major risk for SQL injection vulnerabilities. Furthermore, all analyzed taint flows originate from unsanitized paths, with two flagged as high severity. This suggests that user-supplied data is likely being processed without adequate validation or sanitization, creating a strong possibility of various injection attacks. The vulnerability history is clean, with no recorded CVEs. While this is encouraging, it does not negate the immediate risks identified in the static analysis. The lack of recent vulnerabilities might be due to the plugin's limited functionality or a lack of extensive security auditing. In conclusion, while the plugin's minimal attack surface is a strength, the raw SQL queries and unsanitized taint flows present critical security weaknesses that require immediate attention. The absence of historical vulnerabilities should not lead to complacency given the current code-level risks.

Key Concerns

  • All SQL queries use raw SQL, no prepared statements
  • All taint flows have unsanitized paths
  • High severity taint flows found
  • No nonce checks found
  • No capability checks found
  • Low percentage of properly escaped output
Vulnerabilities
None known

Invite Friends Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Invite Friends Code Analysis

Dangerous Functions
0
Raw SQL Queries
5
0 prepared
Unescaped Output
17
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared5 total queries

Output Escaping

11% escaped19 total outputs
Data Flows
5 unsanitized

Data Flow Analysis

5 flows5 with unsanitized paths
<activate> (pages\activate.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Invite Friends Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menuinvite-friends.php:154
actioninitinvite-friends.php:155
actiontemplate_redirectinvite-friends.php:157
filterquery_varsinvite-friends.php:158
actionactivate_invite-friends/invite-friends.phpinvite-friends.php:159
Maintenance & Trust

Invite Friends Maintenance & Trust

Maintenance Signals

WordPress version tested2.6
Last updatedAug 5, 2008
PHP min version
Downloads21K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Invite Friends Developer Profile

DjZoNe

5 plugins · 3K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Invite Friends

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/invite-friends/pages/activate.php

HTML / DOM Fingerprints

CSS Classes
login
Data Attributes
id="if_user_login"name="if_user_login"id="if_choose_login_form"name="if_choose_login_form"
JS Globals
window.onloaddocument.getElementById('if_user_login').focus()
FAQ

Frequently Asked Questions about Invite Friends