iSMS 2 Factor Authentication Security & Risk Analysis

wordpress.org/plugins/isms-2-factor-authentication

SMS Authenticator (SMS Verification) integration for your WordPress contact forms.

10 active installs v1.0 PHP 7.0+ WP 5.2+ Updated May 21, 2021
form-authenticatorotp-smssms-verificationtags-sms
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is iSMS 2 Factor Authentication Safe to Use in 2026?

Generally Safe

Score 85/100

iSMS 2 Factor Authentication has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "isms-2-factor-authentication" plugin v1.0 presents a significant security risk primarily due to its unprotected attack surface and lack of fundamental security checks. The static analysis reveals four AJAX handlers, all of which lack authentication checks, creating direct entry points for potential attacks. Furthermore, the absence of any nonce or capability checks on these AJAX handlers is a critical omission, making them vulnerable to cross-site request forgery (CSRF) and unauthorized actions. The presence of the `unserialize` function is also a concern, especially when combined with unsanitized input, as it can lead to remote code execution vulnerabilities if not handled with extreme care and robust input validation.

Despite the lack of recorded historical vulnerabilities (CVEs), this does not indicate a secure plugin. Instead, it suggests that the plugin may not have been thoroughly audited or subjected to rigorous testing for common web vulnerabilities. The taint analysis showing two flows with unsanitized paths, categorized as high severity, directly supports the concerns raised by the unprotected AJAX handlers and lack of input validation. The plugin's reliance on jQuery, while common, doesn't inherently introduce risk unless it's an outdated or vulnerable version, which isn't specified here. Overall, the plugin's current state, with a large unprotected attack surface and critical security control omissions, makes it a high-risk component for any WordPress site.

Key Concerns

  • AJAX handlers without auth checks
  • Unprotected AJAX entry points
  • Dangerous unserialize function
  • Taint flow: unsanitized paths (high)
  • Taint flow: unsanitized paths (high)
  • Raw SQL without prepare (17%)
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

iSMS 2 Factor Authentication Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

iSMS 2 Factor Authentication Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

iSMS 2 Factor Authentication Code Analysis

Dangerous Functions
2
Raw SQL Queries
5
1 prepared
Unescaped Output
8
23 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
2
Bundled Libraries
1

Dangerous Functions Found

unserializeif (@unserialize($option) !== false) {includes\Plugin.php:642
unserializereturn unserialize($option);includes\Plugin.php:643

Bundled Libraries

jQuery

SQL Query Safety

17% prepared6 total queries

Output Escaping

74% escaped31 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
verify_otp (includes\iSMSAuth.php:38)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
4 unprotected

iSMS 2 Factor Authentication Attack Surface

Entry Points4
Unprotected4

AJAX Handlers 4

authwp_ajax_generate_otp_codeincludes\iSMSAuth.php:31
noprivwp_ajax_generate_otp_codeincludes\iSMSAuth.php:32
authwp_ajax_verify_otpincludes\iSMSAuth.php:34
noprivwp_ajax_verify_otpincludes\iSMSAuth.php:35
WordPress Hooks 12
actionadmin_menuincludes\iSMSAuth.php:9
actionadmin_initincludes\iSMSAuth.php:10
actionadmin_enqueue_scriptsincludes\iSMSAuth.php:11
actionwp_enqueue_scriptsincludes\iSMSAuth.php:12
actionwoocommerce_register_form_startincludes\iSMSAuth.php:16
actionwoocommerce_register_postincludes\iSMSAuth.php:17
actionwoocommerce_created_customerincludes\iSMSAuth.php:18
actionwp_footerincludes\iSMSAuth.php:21
actionin_admin_footerincludes\iSMSAuth.php:23
actionwp_footerincludes\iSMSAuth.php:24
filtermce_external_pluginsincludes\Plugin.php:214
filtermce_buttonsincludes\Plugin.php:215
Maintenance & Trust

iSMS 2 Factor Authentication Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedMay 21, 2021
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

iSMS 2 Factor Authentication Developer Profile

mobiweb

3 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect iSMS 2 Factor Authentication

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/isms-2-factor-authentication/assets/prefix/css/intlTelInput.css/wp-content/plugins/isms-2-factor-authentication/assets/css/ismsauthstyle.css/wp-content/plugins/isms-2-factor-authentication/assets/prefix/js/intlTelInput.js/wp-content/plugins/isms-2-factor-authentication/assets/js/ismsauth.js/wp-content/plugins/isms-2-factor-authentication/assets/public/css/ismsauthstyle.css/wp-content/plugins/isms-2-factor-authentication/assets/public/js/ismsauth.js
Script Paths
/wp-content/plugins/isms-2-factor-authentication/assets/prefix/js/intlTelInput.js/wp-content/plugins/isms-2-factor-authentication/assets/js/ismsauth.js/wp-content/plugins/isms-2-factor-authentication/assets/public/js/ismsauth.js

HTML / DOM Fingerprints

CSS Classes
intl-tel-input
Data Attributes
data-countrycodedata-preferred-countrydata-utils-script
JS Globals
ajaxurlisms_auth_public_ajaxismsauthScript
REST Endpoints
/wp-json/isms-2-factor-authentication/v1/generate_otp_code/wp-json/isms-2-factor-authentication/v1/verify_otp
FAQ

Frequently Asked Questions about iSMS 2 Factor Authentication