Modal Dialog Security & Risk Analysis

wordpress.org/plugins/modal-dialog

The purpose of this plugin is to allow users to create one or more modal dialog(s) / pop-up window(s) that will appear when a user visits their site.

500 active installs v3.5.17 PHP + WP 2.8+ Updated Feb 15, 2026
dialogmodalmultiplepop-upwindow
99
A · Safe
CVEs total2
Unpatched0
Last CVEApr 21, 2023
Safety Verdict

Is Modal Dialog Safe to Use in 2026?

Generally Safe

Score 99/100

Modal Dialog has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Apr 21, 2023Updated 1mo ago
Risk Assessment

The 'modal-dialog' v3.5.17 plugin exhibits a mixed security posture. On the positive side, there are no identified AJAX handlers or REST API routes without authentication or proper permission checks, and no shortcodes or cron events are present, contributing to a minimal attack surface. Furthermore, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are good security practices. The presence of nonce and capability checks also indicates some effort towards securing functionalities.

However, a significant concern arises from the static analysis regarding output escaping. With 46% of outputs not properly escaped, there is a considerable risk of Cross-Site Scripting (XSS) vulnerabilities. This is further corroborated by the vulnerability history, which shows two medium-severity CVEs, both identified as Cross-Site Scripting (XSS), with the last one occurring relatively recently in April 2023. The taint analysis also highlights five flows with unsanitized paths, suggesting potential avenues for injection attacks, although these were not classified as critical or high severity in this analysis.

In conclusion, while the plugin has strengths in minimizing its attack surface and securing database interactions, the prevalent issue of unescaped output and the history of XSS vulnerabilities are serious concerns. The recent nature of past vulnerabilities suggests that these issues may not have been fully addressed or that the underlying coding practices still leave room for such weaknesses. Users should be cautious due to the potential for XSS, and developers should prioritize improving output sanitization.

Key Concerns

  • Significant portion of outputs not properly escaped
  • History of medium severity XSS vulnerabilities
  • Flows with unsanitized paths found
Vulnerabilities
2

Modal Dialog Security Vulnerabilities

CVEs by Year

2 CVEs in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2023-31071medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Modal Dialog <= 3.5.14 - Reflected Cross-Site Scripting

Apr 21, 2023 Patched in 3.5.15 (277d)
CVE-2023-24001medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Modal Dialog <= 3.5.9 - Authenticated (Admin+) Stored Cross-Site Scripting

Jan 23, 2023 Patched in 3.5.10 (365d)
Code Analysis
Analyzed Mar 16, 2026

Modal Dialog Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
43
37 escaped
Nonce Checks
2
Capability Checks
5
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

46% escaped80 total outputs
Data Flows
5 unsanitized

Data Flow Analysis

7 flows5 with unsanitized paths
on_show_page (modal-dialog-admin.php:242)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Modal Dialog Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
filterscreen_layout_columnsmodal-dialog-admin.php:11
actionadmin_menumodal-dialog-admin.php:13
actionadmin_post_save_modal_dialog_generalmodal-dialog-admin.php:15
actionadmin_post_save_modal_dialog_configurationsmodal-dialog-admin.php:16
actionadd_meta_boxesmodal-dialog-admin.php:18
actionedit_postmodal-dialog-admin.php:20
actionsave_postmodal-dialog-admin.php:21
actionadmin_enqueue_scriptsmodal-dialog-admin.php:23
actionadmin_headmodal-dialog.php:85
actionwp_enqueue_scriptsmodal-dialog.php:88
filtermodal_dialog_contentmodal-dialog.php:89
actionwp_headmodal-dialog.php:100
actionwp_footermodal-dialog.php:101
actioncomment_post_redirectmodal-dialog.php:106
Maintenance & Trust

Modal Dialog Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 15, 2026
PHP min version
Downloads148K

Community Trust

Rating88/100
Number of ratings16
Active installs500
Developer Profile

Modal Dialog Developer Profile

Yannick Lefebvre

8 plugins · 11K total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
529 days
View full developer profile
Detection Fingerprints

How We Detect Modal Dialog

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/modal-dialog/fancybox/jquery.fancybox-1.3.4.css/wp-content/plugins/modal-dialog/js/modal-dialog.js/wp-content/plugins/modal-dialog/js/modal-dialog-admin.js/wp-content/plugins/modal-dialog/css/modal-dialog-admin.css/wp-content/plugins/modal-dialog/css/modal-dialog.css
Script Paths
/wp-content/plugins/modal-dialog/fancybox/jquery.fancybox-1.3.4.js/wp-content/plugins/modal-dialog/js/modal-dialog.js/wp-content/plugins/modal-dialog/js/modal-dialog-admin.js
Version Parameters
modal-dialog/style.css?ver=modal-dialog/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
modal-dialog-popupfancybox-closefancybox-title-overfancybox-navfancybox-prevfancybox-nextfancybox-overlay
HTML Comments
<!-- [if lt IE 7] --><!-- [/if] --><!-- modal-dialog --><!-- modal-dialog -->
Data Attributes
data-modal-dialog-id
JS Globals
jQuery.fancyboxmodal_dialog_var
Shortcode Output
[modal-dialog[/modal-dialog]
FAQ

Frequently Asked Questions about Modal Dialog