Personizely — A/B Testing, Personalization, Popups & CRO Security & Risk Analysis

wordpress.org/plugins/personizely

Personizely is a Conversion Optimization Toolkit that helps you boost engagement and sales through A/B testing, website personalization, and popups.

400 active installs v0.11 PHP 5.3+ WP 3.1+ Updated Nov 5, 2025
ab-testingcontact-form-builderexit-intent-popuppopupssplit-testing
99
A · Safe
CVEs total1
Unpatched0
Last CVEMay 2, 2025
Download
Safety Verdict

Is Personizely — A/B Testing, Personalization, Popups & CRO Safe to Use in 2026?

Generally Safe

Score 99/100

Personizely — A/B Testing, Personalization, Popups & CRO has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: May 2, 2025Updated 4mo ago
Risk Assessment

The Personizely plugin v0.12 exhibits a mixed security posture. On the positive side, it demonstrates strong adherence to secure coding practices by avoiding dangerous functions, using prepared statements for all SQL queries, and implementing nonce and capability checks. The absence of file operations and external HTTP requests further reduces its attack surface. However, a significant concern arises from the low percentage of properly escaped output (27%), indicating a potential for Cross-Site Scripting (XSS) vulnerabilities, especially given its past vulnerability history.

The static analysis identified no critical or high severity taint flows, which is encouraging. The plugin's vulnerability history, while showing only one past medium severity CVE related to XSS, suggests that proper input sanitization and output escaping remain areas requiring vigilance. The fact that the last vulnerability was recorded on 2025-05-02 suggests recent awareness but also highlights that vulnerabilities can still emerge.

In conclusion, while Personizely v0.12 has made strides in securing its codebase, the prevalent issue of insufficient output escaping presents a tangible risk. This, coupled with a historical XSS vulnerability, necessitates careful attention to ensure all user-provided data displayed on the frontend is robustly sanitized. The plugin is generally well-protected regarding direct entry points, but the lack of comprehensive output escaping is its most significant weakness.

Key Concerns

  • Low percentage of properly escaped output
  • Past medium severity XSS vulnerability
Vulnerabilities
1

Personizely — A/B Testing, Personalization, Popups & CRO Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-3779medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Personizely <= 0.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via widgetId Parameter

May 2, 2025 Patched in 0.11 (3d)
Code Analysis
Analyzed Mar 16, 2026

Personizely — A/B Testing, Personalization, Popups & CRO Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
4 escaped
Nonce Checks
2
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

27% escaped15 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
handle_form (class.personizely-admin.php:77)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Personizely — A/B Testing, Personalization, Popups & CRO Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[ply-widget] class.personizely.php:18
[ply-placeholder] class.personizely.php:19
WordPress Hooks 10
actionadmin_menuclass.personizely-admin.php:15
actionadmin_initclass.personizely-admin.php:16
filterallowed_redirect_hostsclass.personizely-admin.php:17
actionwp_print_scriptsclass.personizely.php:17
filtersgo_javascript_combine_excluded_external_pathsclass.personizely.php:22
filterrocket_minify_excluded_external_jsclass.personizely.php:25
filterjetpack_boost_render_blocking_js_exclude_handlesclass.personizely.php:28
filterwpmeteor_excludeclass.personizely.php:31
actioninitpersonizely.php:31
actioninitpersonizely.php:35
Maintenance & Trust

Personizely — A/B Testing, Personalization, Popups & CRO Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedNov 5, 2025
PHP min version5.3
Downloads14K

Community Trust

Rating96/100
Number of ratings25
Active installs400
Developer Profile

Personizely — A/B Testing, Personalization, Popups & CRO Developer Profile

Sergiu Cazac

1 plugin · 400 total installs

99
trust score
Avg Security Score
99/100
Avg Patch Time
3 days
View full developer profile
Detection Fingerprints

How We Detect Personizely — A/B Testing, Personalization, Popups & CRO

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/personizely/class.personizely.php/wp-content/plugins/personizely/class.personizely-admin.php/wp-content/plugins/personizely/personizely.php
Script Paths
https://static.personizely.net/.*.js

HTML / DOM Fingerprints

Data Attributes
data-ply-embedded-widgetdata-ply-placeholder
Shortcode Output
<div data-ply-embedded-widget=''</div><div data-ply-placeholder=''</div>
FAQ

Frequently Asked Questions about Personizely — A/B Testing, Personalization, Popups & CRO