
MoceanAPI SendSMS Security & Risk Analysis
wordpress.org/plugins/moceanapi-sendsmsA plugin to send SMS notification to your wordpress users
Is MoceanAPI SendSMS Safe to Use in 2026?
Generally Safe
Score 85/100MoceanAPI SendSMS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The moceanapi-sendsms plugin exhibits a generally good security posture with no known past vulnerabilities. Static analysis indicates a minimal attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events directly exposed without authentication. The code also demonstrates a commitment to secure coding practices, with a high percentage of SQL queries using prepared statements and output escaping. However, there are significant concerns highlighted by the taint analysis, specifically the presence of two high-severity flows with unsanitized paths. This suggests potential vulnerabilities where untrusted input could be used in a dangerous way, even though they did not reach critical severity. Additionally, the complete absence of nonce checks is a notable weakness, especially for a plugin that might handle sensitive operations, leaving it susceptible to CSRF attacks if any of its (currently non-existent) entry points were to be exploited.
While the plugin has a clean vulnerability history, the taint analysis findings cannot be ignored. The high number of unsanitized paths (7 out of 8 flows) indicates a pervasive issue in how external data is handled, and the two high-severity flows are a direct warning sign. The lack of nonce checks further compounds this by omitting a fundamental security control for web applications. The plugin's strengths lie in its limited attack surface and good practices in SQL and output handling. However, the identified taint issues and missing nonce checks represent significant areas of risk that require immediate attention and remediation to ensure a robust security posture.
Key Concerns
- High severity taint flows with unsanitized paths
- Flows with unsanitized paths detected
- Missing nonce checks on all entry points
- Bundled library Freemius v1.0 (potential outdated version)
MoceanAPI SendSMS Security Vulnerabilities
MoceanAPI SendSMS Code Analysis
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
MoceanAPI SendSMS Attack Surface
WordPress Hooks 112
Maintenance & Trust
MoceanAPI SendSMS Maintenance & Trust
Maintenance Signals
Community Trust
MoceanAPI SendSMS Alternatives
Abandoned cart SMS reminders and SMS campaigns – CartFox
cartfox
Dynamic SMS abandoned cart reminders with coupons, post-purchase campaigns and various options for SMS campaigns. Available for 58 languages worldwide …
ClickSend SMS Woo Integration
clicksendsms
ClickSend SMS Woo Integration helps to send transactions & promotional sms to wooCommerce store owners.
text message sms plugin
text-message
text message by biz text lets your website receive and send text messages. reply to text messages from a pc or forward messages to your mobile phone.
Branded SMS Pakistan
branded-sms-pakistan
Branded SMS Pakistan - WooCommerce plugin will allow you to send Branded or Short Code SMS notification automatically for orders placed in WooCommerce …
MoceanAPI Order SMS Notification for WooCommerce
moceansms-order-sms-notification-for-woocommerce
A plugin to send SMS notification to both buyer and seller after an order is placed in WooCommerce. SMS notification can be sent on all order statuses …
MoceanAPI SendSMS Developer Profile
4 plugins · 60 total installs
How We Detect MoceanAPI SendSMS
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/moceanapi-sendsms/moceanapi-sendsms.php/wp-content/plugins/moceanapi-sendsms/includes/class-moceansms-automations.php/wp-content/plugins/moceanapi-sendsms/includes/plugins/MoceanARMemberLite.php/wp-content/plugins/moceanapi-sendsms/includes/plugins/MoceanWooCommerce.phpHTML / DOM Fingerprints
moceansms-open-keyworddata-attr-typedata-attr-target