Personal Welcome Security & Risk Analysis

wordpress.org/plugins/personal-welcome

Personal Welcome is a Wordpress plugin that allows site administrators to create and send personalised welcome messages to new users.

10 active installs v0.3.7 PHP + WP 2.7+ Updated Apr 20, 2015
buddypressemailpersonalwelcomewordpress-mu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Personal Welcome Safe to Use in 2026?

Generally Safe

Score 85/100

Personal Welcome has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "personal-welcome" plugin v0.3.7 exhibits a mixed security posture. On the positive side, it demonstrates good practices by using prepared statements for all SQL queries and has no known historical vulnerabilities, suggesting a relatively secure development history. The plugin also avoids risky operations like file operations or external HTTP requests, and has a negligible attack surface with no direct entry points identified in the static analysis.

However, significant concerns arise from the output escaping and taint analysis. The static analysis reveals that 100% of outputs are not properly escaped, which is a major security weakness. This lack of output escaping could lead to Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the WordPress site. Furthermore, the taint analysis identified one flow with unsanitized paths of high severity, directly pointing to a potential vulnerability related to how data is handled, even without a direct path to a dangerous function.

The absence of any recorded vulnerabilities or CVEs is a strong positive indicator. However, this should not overshadow the critical finding regarding unescaped output and the high-severity taint flow. The current version has potential exploitable flaws that need immediate attention. While the plugin has a clean history, the static analysis reveals new and serious risks that have likely not been addressed in previous versions.

Key Concerns

  • 0% of outputs properly escaped
  • 1 high severity unsanitized path flow
  • 0 nonce checks found
Vulnerabilities
None known

Personal Welcome Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Personal Welcome Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
34
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

0% escaped34 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
<personal_welcome> (personal_welcome.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Personal Welcome Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menupersonal_welcome.php:14
actionadmin_headpersonal_welcome.php:15
Maintenance & Trust

Personal Welcome Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedApr 20, 2015
PHP min version
Downloads13K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Personal Welcome Developer Profile

Chris Taylor

11 plugins · 460 total installs

81
trust score
Avg Security Score
81/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Personal Welcome

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
personalwelcome
Data Attributes
data-personal_welcome_sent
FAQ

Frequently Asked Questions about Personal Welcome