McPopup – Popup Form for Mailchimp Security & Risk Analysis

wordpress.org/plugins/mcpopup-popup-form-for-mailchimp

The easiest way to display Mailchimp Popup form on a WordPress site. Responsive Popup form, increase your subscribers on Mailchimp, and many features.

40 active installs v1.0.0 PHP 5.2.4+ WP 4.0+ Updated Aug 12, 2020
email-marketingmailchimpmailing-listnewslettersubscription
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is McPopup – Popup Form for Mailchimp Safe to Use in 2026?

Generally Safe

Score 85/100

McPopup – Popup Form for Mailchimp has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The plugin "mcpopup-popup-form-for-mailchimp" version 1.0.0 exhibits a generally good security posture based on the static analysis provided. There are no identified vulnerabilities in its history, suggesting a well-maintained and secure codebase over time. The absence of dangerous functions, raw SQL queries, file operations, and critical taint flows indicates careful development practices. The plugin also implements capability checks, which is a positive security measure.

However, there are areas for improvement. A significant concern is the 54% output escaping rate, meaning a substantial portion of the plugin's output is not properly escaped. This could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled carefully before being displayed. Furthermore, the lack of nonce checks on any AJAX handlers (which are also absent) and the absence of REST API permission callbacks on any REST API routes suggest that if such entry points were to be added in the future without proper security considerations, they would be unprotected. The presence of external HTTP requests also warrants careful monitoring for any potential insecure handling of responses.

In conclusion, while the plugin benefits from a clean vulnerability history and the absence of many common risky code patterns, the insufficient output escaping presents a notable risk. The lack of any identified attack surface is a strength, but the potential for future issues due to unaddressed output escaping needs attention. The plugin appears robust at this version but requires diligent output sanitization to mitigate XSS risks.

Key Concerns

  • Output escaping is only 54% proper
  • No nonce checks on AJAX handlers
  • No permission callbacks on REST API routes
Vulnerabilities
None known

McPopup – Popup Form for Mailchimp Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

McPopup – Popup Form for Mailchimp Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
33
39 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

54% escaped72 total outputs
Attack Surface

McPopup – Popup Form for Mailchimp Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
actionadmin_enqueue_scriptsadmin\admin.php:15
actionadmin_menuadmin\admin.php:28
actionadmin_menuadmin\admin.php:41
actionadmin_initadmin\admin.php:157
actionadmin_initadmin\default-options.php:55
actionadmin_initadmin\default-options.php:85
actionadmin_menuadmin\extension.php:16
actionadmin_initadmin\settings.php:50
actionwp_enqueue_scriptsform\form.php:10
filtermcpup_js_fadein_fiform\form.php:22
actiontemplate_redirectform\form.php:130
actionwp_footerform\form.php:143
filtermcpup_form_api_fiform\form_processing.php:97
actioninitform\form_processing.php:191
filterplugin_row_metamcpopup-popup-form-for-mailchimp.php:45
filterplugin_action_linksmcpopup-popup-form-for-mailchimp.php:66
Maintenance & Trust

McPopup – Popup Form for Mailchimp Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedAug 12, 2020
PHP min version5.2.4
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

McPopup – Popup Form for Mailchimp Developer Profile

Alobaidi

22 plugins · 33K total installs

81
trust score
Avg Security Score
90/100
Avg Patch Time
52 days
View full developer profile
Detection Fingerprints

How We Detect McPopup – Popup Form for Mailchimp

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mcpopup-popup-form-for-mailchimp/menu-icon/css/mail.css/wp-content/plugins/mcpopup-popup-form-for-mailchimp/css/style.css/wp-content/plugins/mcpopup-popup-form-for-mailchimp/js/reset-button.js
Script Paths
/wp-content/plugins/mcpopup-popup-form-for-mailchimp/js/reset-button.js

HTML / DOM Fingerprints

CSS Classes
mcpup-exofusemcpup-get-premexmcpup-settings-form-h2mcpup-premex-btnmcpopup-admin-formmcpup-read-eou
Data Attributes
mcpup-exofusemcpup-get-premexmcpup-premex-btnmcpup-read-eou
FAQ

Frequently Asked Questions about McPopup – Popup Form for Mailchimp