Jellyreach Security & Risk Analysis

wordpress.org/plugins/jellyreach

Jellyreach is an email and SMS marketing automation tool. This plugin lets WooCommerce stores import data into Jellyreach, and then enables creating s …

30 active installs v1.0.0 PHP + WP 4.4+ Updated May 10, 2022
email-marketingmarketing-automationsms-marketing
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Jellyreach Safe to Use in 2026?

Generally Safe

Score 85/100

Jellyreach has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The Jellyreach plugin v1.0.0 exhibits a generally good security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the adherence to prepared statements for all SQL queries and proper escaping of a majority of outputs are positive indicators of secure coding practices. The plugin also avoids dangerous functions and file operations, which are common sources of vulnerabilities.

However, there are notable concerns. The presence of two taint flows with unsanitized paths, even without critical or high severity, warrants attention as these could potentially lead to unexpected behavior or vulnerabilities if exploited. The lack of nonce and capability checks on any potential entry points, combined with external HTTP requests, suggests potential weaknesses. The vulnerability history being clean is a strength, but it could also indicate that the plugin has not been extensively tested or targeted, rather than being inherently perfect.

In conclusion, while Jellyreach v1.0.0 demonstrates good foundational security practices, the identified taint flows and the absence of authorization checks on potential entry points represent areas for improvement. The clean vulnerability history is positive, but the identified code signals suggest that the plugin is not entirely risk-free and further scrutiny might be beneficial.

Key Concerns

  • Taint flows with unsanitized paths detected
  • No nonce checks detected
  • No capability checks detected
  • Some outputs not properly escaped
  • External HTTP requests made
Vulnerabilities
None known

Jellyreach Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Jellyreach Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

75% escaped4 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
jellyreach_settings (admin\partials\jellyreach-settings.php:3)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Jellyreach Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actionplugins_loadedincludes\class-jellyreach.php:138
actionadmin_enqueue_scriptsincludes\class-jellyreach.php:151
actionadmin_enqueue_scriptsincludes\class-jellyreach.php:152
actionadmin_menuincludes\class-jellyreach.php:153
actionwoocommerce_before_single_productincludes\class-jellyreach.php:166
actionwoocommerce_add_to_cartincludes\class-jellyreach.php:167
actionwoocommerce_before_cartincludes\class-jellyreach.php:168
actionwoocommerce_applied_couponincludes\class-jellyreach.php:169
actionwoocommerce_removed_couponincludes\class-jellyreach.php:170
actionwoocommerce_before_checkout_formincludes\class-jellyreach.php:171
actionwoocommerce_checkout_order_processedincludes\class-jellyreach.php:172
Maintenance & Trust

Jellyreach Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedMay 10, 2022
PHP min version
Downloads68K

Community Trust

Rating100/100
Number of ratings1
Active installs30
Developer Profile

Jellyreach Developer Profile

nedimtalovic

1 plugin · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Jellyreach

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/jellyreach/admin/css/jellyreach-admin.css/wp-content/plugins/jellyreach/admin/js/jellyreach-admin.js
Version Parameters
jellyreach-admin.css?ver=jellyreach-admin.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Jellyreach