Jetpack Subscription Form Security & Risk Analysis

wordpress.org/plugins/jetpack-subscription-form

Provides You a customizable widget for jetpack subscription Form

100 active installs v1.1.3 PHP + WP 3.1.2+ Updated Aug 29, 2016
custom-jetpack-subscriptionjetpackjetpack-adonjetpack-subscriptionjetpcak-subsciption-form
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Jetpack Subscription Form Safe to Use in 2026?

Generally Safe

Score 85/100

Jetpack Subscription Form has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The jetpack-subscription-form plugin v1.1.3 exhibits a generally good security posture based on the provided static analysis. The absence of any identified dangerous functions, file operations, or external HTTP requests is a significant strength. Furthermore, the sole SQL query is properly prepared, mitigating the risk of SQL injection. The plugin also boasts a clean vulnerability history with no recorded CVEs, suggesting a history of stable and secure development.

However, a notable concern arises from the output escaping analysis, where only 52% of outputs are properly escaped. This indicates a potential for cross-site scripting (XSS) vulnerabilities if user-supplied data is not sufficiently sanitized before being rendered on the page. While the attack surface is minimal with no identified entry points, the lack of explicit capability checks or nonce checks on these (currently non-existent) entry points is a weakness. In a plugin with more entry points, this would be a significant concern. The clean taint analysis and lack of unsanitized paths are positive indicators, but the output escaping issue should be addressed to further harden the plugin's security.

In conclusion, this plugin is likely secure for its current functionality due to the lack of exploitable entry points and absence of critical code issues. However, the moderate rate of unescaped output presents a potential risk that should be remediated. The plugin's clean history is reassuring, but ongoing vigilance and proper sanitization practices are crucial for maintaining security.

Key Concerns

  • Low output escaping rate
  • No capability checks on entry points
  • No nonce checks on entry points
Vulnerabilities
None known

Jetpack Subscription Form Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Jetpack Subscription Form Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
47
51 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

52% escaped98 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
widget (jetpack-subscription.php:38)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Jetpack Subscription Form Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initjetpack-subscription.php:417
Maintenance & Trust

Jetpack Subscription Form Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedAug 29, 2016
PHP min version
Downloads13K

Community Trust

Rating80/100
Number of ratings4
Active installs100
Developer Profile

Jetpack Subscription Form Developer Profile

Kiran Antony

3 plugins · 180 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Jetpack Subscription Form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/jetpack-subscription-form/subscriptions/subscriptions.css

HTML / DOM Fingerprints

CSS Classes
jetpack_subscription_custom_widgeterrorsuccesssubscribe-email
Data Attributes
id="subscribe-blog-id="subscribe-logo"id="subscribe-text"
FAQ

Frequently Asked Questions about Jetpack Subscription Form