Notifly Security & Risk Analysis

wordpress.org/plugins/notifly

Send notification emails of all new posts and new comments to everyone on a list. Great for private blogs.

30 active installs v1.4 PHP + WP 3.0+ Updated Jul 2, 2018
commentsnotificationpostsubscribesubscription
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Notifly Safe to Use in 2026?

Generally Safe

Score 85/100

Notifly has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The plugin "notifly" v1.4 exhibits a generally strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points is a significant positive, minimizing the potential attack surface. Furthermore, the plugin does not utilize dangerous functions, perform file operations, or make external HTTP requests, which are common vectors for vulnerabilities. The use of prepared statements in most SQL queries (80%) also suggests good database interaction practices.

However, there are a few areas for concern. The complete lack of nonce checks and capability checks across all identified entry points (which are zero in this analysis) is a notable weakness. While there are no currently exposed entry points, if any are introduced in future versions or if the analysis is incomplete, these missing checks could lead to critical security flaws like Cross-Site Request Forgery (CSRF) or privilege escalation. The 50% rate of properly escaped output is also a mild concern, indicating that half of the plugin's output may be vulnerable to Cross-Site Scripting (XSS) attacks if the data originates from an untrusted source.

The vulnerability history is entirely clear, with no recorded CVEs. This is an excellent indicator that the plugin has historically been maintained securely. However, it's important to remember that a clean history does not guarantee future security. The lack of observed taint flows also suggests that current static analysis did not reveal any critical vulnerabilities, but this analysis might be limited in scope. Overall, while "notifly" v1.4 presents a solid foundation with a small attack surface and good database practices, the absence of nonce and capability checks, along with the partially unescaped output, warrants attention for potential future risks.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Partially unescaped output
Vulnerabilities
None known

Notifly Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Notifly Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
4 prepared
Unescaped Output
1
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

80% prepared5 total queries

Output Escaping

50% escaped2 total outputs
Attack Surface

Notifly Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
actioninitnotifly.php:35
actionadmin_initnotifly.php:38
actionadmin_noticesnotifly.php:39
filterplugin_action_linksnotifly.php:40
actioncomment_postnotifly.php:43
actiontransition_comment_statusnotifly.php:45
actiontransition_post_statusnotifly.php:46
filternotifly_textnotifly.php:49
filternotifly_textnotifly.php:50
filternotifly_textnotifly.php:51
filternotifly_textnotifly.php:52
filternotifly_textnotifly.php:53
filternotifly_textnotifly.php:54
filternotifly_textnotifly.php:55
Maintenance & Trust

Notifly Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJul 2, 2018
PHP min version
Downloads10K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

Notifly Developer Profile

Automattic

393 plugins · 20.8M total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
1221 days
View full developer profile
Detection Fingerprints

How We Detect Notifly

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
id="pce_email_addresses"id="pce_email_moderator"id="pce_email_post_author"
FAQ

Frequently Asked Questions about Notifly