NPS computy Security & Risk Analysis

wordpress.org/plugins/nps-computy

Free monitoring of the NPS (Net Promoter Score) index for your business.

50 active installs v2.8.4 PHP 7.4+ WP 4.5+ Updated Jan 2, 2026
npspromoterscoreseostatistic
93
A · Safe
CVEs total4
Unpatched0
Last CVEFeb 4, 2026
Safety Verdict

Is NPS computy Safe to Use in 2026?

Generally Safe

Score 93/100

NPS computy has a strong security track record. Known vulnerabilities have been patched promptly.

4 known CVEsLast CVE: Feb 4, 2026Updated 3mo ago
Risk Assessment

The "nps-computy" v2.8.4 plugin exhibits a mixed security posture. While it demonstrates some good practices, such as a low number of external HTTP requests and file operations, significant concerns remain. The presence of two AJAX handlers without authentication checks presents a direct attack vector, potentially allowing unauthorized users to trigger plugin functionality. Furthermore, the static analysis reveals that a substantial portion of SQL queries are not using prepared statements, increasing the risk of SQL injection vulnerabilities. The output escaping is also a concern, with a notable percentage of outputs not being properly escaped, which could lead to cross-site scripting vulnerabilities.

The plugin's vulnerability history is particularly alarming, with four known CVEs, including one high-severity and three medium-severity issues. The historical prevalence of Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerabilities suggests a recurring pattern of insecure coding practices related to input handling and state management. Although there are currently no unpatched vulnerabilities, the sheer number and types of past issues indicate a systemic weakness that needs addressing. The presence of an outdated bundled library (DataTables v1.10.21) also adds to the risk profile.

In conclusion, while the plugin avoids certain high-risk areas like critical taint flows or raw file operations, the combination of unprotected entry points, insecure SQL practices, insufficient output escaping, and a history of common and severe vulnerabilities points to a moderate to high overall security risk. Addressing the unprotected AJAX handlers, improving SQL sanitation, and ensuring proper output escaping are critical next steps to improve its security.

Key Concerns

  • Unprotected AJAX handlers
  • Significant portion of SQL queries not prepared
  • Substantial percentage of outputs not escaped
  • Bundled outdated library (DataTables v1.10.21)
  • History of high-severity vulnerabilities (1)
  • History of medium-severity vulnerabilities (3)
Vulnerabilities
4

NPS computy Security Vulnerabilities

CVEs by Year

3 CVEs in 2024
2024
1 CVE in 2026
2026
Patched Has unpatched

Severity Breakdown

High
1
Medium
3

4 total CVEs

CVE-2025-67984high · 7.2Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

NPS computy <= 2.8.2 - Unauthenticated Stored Cross-Site Scripting

Feb 4, 2026 Patched in 2.8.3 (6d)
CVE-2024-11807medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

NPS computy <= 2.8.0 - Reflected Cross-Site Scripting

Dec 3, 2024 Patched in 2.8.1 (1d)
CVE-2024-1755medium · 4.3Cross-Site Request Forgery (CSRF)

NPS computy <= 2.7.5 - Cross-Site Request Forgery to Results Deletion

Mar 25, 2024 Patched in 2.7.6 (7d)
CVE-2024-1754medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

NPS computy <= 2.7.5 - Authenticated (Admin+) Stored Cross-Site Scripting

Mar 25, 2024 Patched in 2.7.6 (7d)
Code Analysis
Analyzed Mar 16, 2026

NPS computy Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
11 prepared
Unescaped Output
32
58 escaped
Nonce Checks
2
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

DataTables1.10.21

SQL Query Safety

73% prepared15 total queries

Output Escaping

64% escaped90 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
nps_plugin_options (class.nps-computy-admin.php:282)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

NPS computy Attack Surface

Entry Points4
Unprotected2

AJAX Handlers 2

authwp_ajax_nps_computy_ajaxclass.nps-computy-admin.php:13
noprivwp_ajax_nps_computy_ajaxclass.nps-computy-admin.php:14

Shortcodes 2

[nps-computy] index.php:251
[nps-computy-chart] index.php:330
WordPress Hooks 9
actionadmin_menuclass.nps-computy-admin.php:10
actionadmin_enqueue_scriptsclass.nps-computy-admin.php:11
actionadmin_initclass.nps-computy-admin.php:12
filterwp_mail_content_typeclass.nps-computy-admin.php:680
actioninitindex.php:16
actionadmin_noticesindex.php:49
actioninitindex.php:93
actionwp_enqueue_scriptsindex.php:104
actionwp_enqueue_scriptsindex.php:113
Maintenance & Trust

NPS computy Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 2, 2026
PHP min version7.4
Downloads7K

Community Trust

Rating96/100
Number of ratings5
Active installs50
Developer Profile

NPS computy Developer Profile

calliko

6 plugins · 330 total installs

87
trust score
Avg Security Score
99/100
Avg Patch Time
51 days
View full developer profile
Detection Fingerprints

How We Detect NPS computy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/nps-computy/_inc/nps-computy-style.css/wp-content/plugins/nps-computy/_inc/nps-computy-script.js
Script Paths
/wp-content/plugins/nps-computy/_inc/nps-computy-script.js
Version Parameters
nps-computy-style.css?ver=nps-computy-script.js?ver=

HTML / DOM Fingerprints

CSS Classes
npszagolovok-npsquestion-containerdesc-npsvalidationErrornps-radiosindexinput_nps+1 more
HTML Comments
<!--Общие переменные--><!--версия плагина--><!--Страница админки-->/*Страница админки*/+3 more
Data Attributes
id="nps-computy"action="javascript:void(null);"
JS Globals
nps_computy_scriptnps_computy_activatenps_computy_deactivateadd_nps_computy_stylesnps_func
Shortcode Output
<div class="nps"><div class="zagolovok-nps"><div class="desc-nps"><div class="validationError"
FAQ

Frequently Asked Questions about NPS computy