Pop-up Security & Risk Analysis

wordpress.org/plugins/pop-up-pop-up

Pop-up Popups

10K active installs v1.2.8 PHP 5.6+ WP 4.6+ Updated Oct 30, 2025
lightboxmodalspop-uppop-upspopups
99
A · Safe
CVEs total2
Unpatched0
Last CVESep 2, 2022
Safety Verdict

Is Pop-up Safe to Use in 2026?

Generally Safe

Score 99/100

Pop-up has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Sep 2, 2022Updated 5mo ago
Risk Assessment

The "pop-up-pop-up" plugin v1.2.8 exhibits a mixed security posture. While it demonstrates some good security practices, such as using prepared statements for all SQL queries and a significant number of capability checks, there are notable areas of concern. The static analysis revealed a moderate attack surface with 5 AJAX handlers, 2 of which lack authentication checks. This creates potential entry points for unauthorized actions. The presence of the `unserialize` function, especially without clear context on its usage and sanitization, is a red flag that could lead to Remote Code Execution if user-controlled data is passed to it. The plugin's vulnerability history is also a significant concern, with 2 known CVEs, including a past high-severity vulnerability related to Improper Privilege Management and Missing Authorization. While there are currently no unpatched CVEs, this history indicates a recurring pattern of authorization and privilege-related issues that could resurface in future versions or be exploited if the plugin is updated with new vulnerabilities.

Despite the positive aspects like prepared SQL and a good number of capability checks, the identified unprotected AJAX handlers and the history of serious vulnerabilities, particularly those related to authorization, elevate the risk profile. The lack of taint analysis results for this version is a limitation, but the static findings coupled with the past CVEs suggest that careful attention should be paid to authorization and input sanitization, especially for AJAX endpoints. Users should be cautious and ensure they are running the latest secure version of this plugin if possible, and administrators should monitor for any new vulnerabilities.

Key Concerns

  • Unprotected AJAX handlers detected
  • Dangerous function 'unserialize' used
  • Past high severity vulnerability (Improper Privilege Management)
  • Past medium severity vulnerability (Missing Authorization)
  • Output escaping is not fully implemented (56% proper)
Vulnerabilities
2

Pop-up Security Vulnerabilities

CVEs by Year

2 CVEs in 2022
2022
Patched Has unpatched

Severity Breakdown

High
1
Medium
1

2 total CVEs

CVE-2022-38070medium · 5.4Improper Privilege Management

Pop-up <= 1.1.5 - Privilege Escalation

Sep 2, 2022 Patched in 1.1.6 (508d)

Pop-up <= 1.1.1 - Missing authorization to Settings Change

Aug 8, 2022 Patched in 1.1.2 (533d)
Code Analysis
Analyzed Mar 16, 2026

Pop-up Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
30
38 escaped
Nonce Checks
5
Capability Checks
10
File Operations
6
External Requests
3
Bundled Libraries
0

Dangerous Functions Found

unserialize$this->values = is_array($raw) ? $raw : @unserialize($raw);analyst\src\Cache\DatabaseCache.php:47

Output Escaping

56% escaped68 total outputs
Attack Surface
2 unprotected

Pop-up Attack Surface

Entry Points5
Unprotected2

AJAX Handlers 5

authwp_ajax_analyst_notification_dismissanalyst\src\Mutator.php:100
authwp_ajax_inisev_installationmodules\banner\misc.php:65
authwp_ajax_inisev_installation_widgetmodules\banner\misc.php:66
authwp_ajax_inisev_reviewmodules\review\review.php:111
authwp_ajax_wp_mypopupspop-up-pop-up.php:168
WordPress Hooks 24
actioninitanalyst\main.php:65
actioninitanalyst\src\Analyst.php:80
actionadmin_footeranalyst\src\Mutator.php:56
actionadmin_noticesanalyst\src\Mutator.php:74
actionadmin_enqueue_scriptsanalyst\src\Mutator.php:86
actionadmin_menumodules\banner\misc.php:110
actionadmin_menumodules\banner\misc.php:123
actionins_global_print_carrouselmodules\banner\misc.php:165
actionwp_loadedmodules\review\review.php:120
actionadmin_enqueue_scriptsmodules\review\review.php:322
actionadmin_noticesmodules\review\review.php:323
actionwp_headpop-up-pop-up.php:89
actionwp_footerpop-up-pop-up.php:90
actionwp_print_stylespop-up-pop-up.php:91
actionwp_print_scriptspop-up-pop-up.php:92
actionwp_enqueue_scriptspop-up-pop-up.php:93
actionwp_print_footer_scriptspop-up-pop-up.php:94
actionadmin_menupop-up-pop-up.php:98
actionadmin_enqueue_scriptspop-up-pop-up.php:111
actionwp_headpop-up-pop-up.php:127
filteradmin_footer_textpop-up-pop-up.php:134
filterupdate_footerpop-up-pop-up.php:146
actionadmin_initpop-up-pop-up.php:158
actionplugins_loadedpop-up-pop-up.php:386
Maintenance & Trust

Pop-up Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedOct 30, 2025
PHP min version5.6
Downloads346K

Community Trust

Rating94/100
Number of ratings83
Active installs10K
Developer Profile

Pop-up Developer Profile

Inisev

6 plugins · 620K total installs

74
trust score
Avg Security Score
93/100
Avg Patch Time
480 days
View full developer profile
Detection Fingerprints

How We Detect Pop-up

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pop-up-pop-up/js/admin-script.js/wp-content/plugins/pop-up-pop-up/css/admin-style.css/wp-content/plugins/pop-up-pop-up/css/MPU-icon-style.css/wp-content/plugins/pop-up-pop-up/js/underscore-min.js
Generator Patterns
MyPopUps
Script Paths
https://mypopups.com/element?sub
Version Parameters
MPU_PLUGIN_VERSION_CURRENT

HTML / DOM Fingerprints

CSS Classes
wp_mypopups_script
Data Attributes
data-wp_mypopups-nonce
JS Globals
mypopups_localize_script
REST Endpoints
/wp-json/wp_mypopups
FAQ

Frequently Asked Questions about Pop-up