Send Secrets By Kaboom Security & Risk Analysis

wordpress.org/plugins/kaboom-send-secrets

This plugin makes it possible to send secrets to your clients. You use the shortcode [stand_alone_send_secret], there will appear an input field to se …

0 active installs v1.0.4 PHP 7.0.0+ WP 4.0.0+ Updated Unknown
kaboomsecuresend-passwordssend-secrets
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Send Secrets By Kaboom Safe to Use in 2026?

Generally Safe

Score 100/100

Send Secrets By Kaboom has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'kaboom-send-secrets' plugin, version 1.0.4, exhibits a generally strong security posture based on the provided static analysis. The absence of known CVEs and a clean vulnerability history are positive indicators. The plugin also demonstrates good practices with the presence of nonce and capability checks, and no external HTTP requests or file operations that could be exploited. The limited attack surface, with only one shortcode and no unprotected AJAX handlers or REST API routes, further contributes to its secure profile.

However, a significant concern lies within the handling of SQL queries. All four identified SQL queries are executed without prepared statements. This practice exposes the plugin to a substantial risk of SQL injection vulnerabilities, which could allow attackers to manipulate database queries, potentially leading to data theft, modification, or deletion. While the taint analysis did not reveal any unsanitized paths in the limited flows analyzed, the lack of prepared statements for all SQL operations is a critical oversight that needs immediate attention.

In conclusion, while the plugin benefits from a low attack surface and good security practices in most areas, the unmitigated risk of SQL injection due to the exclusive use of raw SQL queries is a major weakness. The strong vulnerability history is encouraging, but it should not lead to complacency, especially given the clear SQL handling issue.

Key Concerns

  • Raw SQL queries without prepared statements
Vulnerabilities
None known

Send Secrets By Kaboom Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Send Secrets By Kaboom Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
0 prepared
Unescaped Output
12
16 escaped
Nonce Checks
1
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared4 total queries

Output Escaping

57% escaped28 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
<settings> (view\settings.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Send Secrets By Kaboom Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[stand_alone_send_secret] send-secrets-by-kaboom.php:33
WordPress Hooks 1
actionadmin_menusend-secrets-by-kaboom.php:32
Maintenance & Trust

Send Secrets By Kaboom Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedUnknown
PHP min version7.0.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Send Secrets By Kaboom Developer Profile

Kaboom Website

2 plugins · 100 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Send Secrets By Kaboom

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/kaboom-send-secrets/view/style.css
Script Paths
/wp-content/plugins/kaboom-send-secrets/view/script.js

HTML / DOM Fingerprints

CSS Classes
kaboom-headershortcode
Data Attributes
data-errordata-error-iddata-error-message
JS Globals
window.location.reload()
Shortcode Output
[stand_alone_send_secret]
FAQ

Frequently Asked Questions about Send Secrets By Kaboom