Homepage Pop-up Security & Risk Analysis

wordpress.org/plugins/pop-up-homepage

Plugin for adding a simple jquery home page pop-up . Add a title and an important information on your home page without getting blocked any by AdBlock …

20 active installs v1.0 PHP + WP 4.1.0+ Updated Feb 12, 2021
customhomepagejquerypop-uppopup
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Homepage Pop-up Safe to Use in 2026?

Generally Safe

Score 85/100

Homepage Pop-up has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The plugin 'pop-up-homepage' v1.0 exhibits a generally positive security posture with no known vulnerabilities or critical findings in the taint analysis. The absence of documented CVEs and the clean taint flow analysis suggest a diligent development process in terms of preventing common attack vectors like cross-site scripting (XSS) and SQL injection. The plugin also shows good practice by implementing nonce checks and capability checks for its limited entry points, although the static analysis reveals no exposed AJAX, REST API, or shortcode entry points that would typically require such checks. This suggests a very limited attack surface, which is a significant security strength.

However, the static analysis does highlight a potential concern with the use of the 'unserialize' function. This function is inherently risky as it can lead to object injection vulnerabilities if used with untrusted input. While the current analysis doesn't show any specific unsanitized flows involving 'unserialize', its presence warrants careful monitoring and potential refactoring to use safer alternatives. Additionally, the fact that none of the SQL queries utilize prepared statements is a significant weakness. This makes the plugin vulnerable to SQL injection attacks if any of the data used in these queries originates from user input without proper sanitization. The 50% rate of properly escaped output also indicates a room for improvement, as unescaped output could lead to XSS vulnerabilities.

In conclusion, 'pop-up-homepage' v1.0 has a strong foundation with no disclosed vulnerabilities and a minimal attack surface. The primary weaknesses lie in the use of 'unserialize' without clear sanitization paths and the complete lack of prepared statements for SQL queries, alongside a moderate rate of unescaped output. These areas represent potential entry points for attackers and should be addressed to further harden the plugin's security.

Key Concerns

  • Raw SQL queries without prepared statements
  • Use of 'unserialize' function
  • 50% of output is not properly escaped
Vulnerabilities
None known

Homepage Pop-up Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Homepage Pop-up Code Analysis

Dangerous Functions
2
Raw SQL Queries
4
0 prepared
Unescaped Output
11
11 escaped
Nonce Checks
2
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$options = unserialize($result[0]->options);views\admin.php:13
unserialize$options = unserialize( $result[0]->options );views\popup.php:16

SQL Query Safety

0% prepared4 total queries

Output Escaping

50% escaped22 total outputs
Attack Surface

Homepage Pop-up Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_menuhpup.php:25
actionadmin_enqueue_scriptshpup.php:26
actionplugins_loadedhpup.php:27
actionwp_footerhpup.php:28
actionadmin_noticesincludes\functions.php:95
actionadmin_noticesincludes\functions.php:98
Maintenance & Trust

Homepage Pop-up Maintenance & Trust

Maintenance Signals

WordPress version tested2.0.1
Last updatedFeb 12, 2021
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Homepage Pop-up Developer Profile

omsuhani

2 plugins · 120 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Homepage Pop-up

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pop-up-homepage/css/hpup_popup.css/wp-content/plugins/pop-up-homepage/js/hpup_popup.js
Script Paths
/wp-content/plugins/pop-up-homepage/js/hpup_popup.js

HTML / DOM Fingerprints

CSS Classes
wrapmetabox-holdercolumns-2postbox-containermeta-box-sortablesui-sortablepostboxhandlediv+6 more
HTML Comments
<!-- /post-body-content -->
Data Attributes
name="activate"id="activate"value="1"selected="selected"value="0"
JS Globals
hpup_popup
FAQ

Frequently Asked Questions about Homepage Pop-up