PopNotifi Security & Risk Analysis

wordpress.org/plugins/popnotifi

The Push Notifications Revolution by PopNotifi

0 active installs v1.0 PHP + WP 2.7+ Updated Unknown
chrome-push-notificationsfirefox-push-notificationspush-notificationssafari-push-notificationswebsite-push-notifications
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PopNotifi Safe to Use in 2026?

Generally Safe

Score 100/100

PopNotifi has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "popnotifi" v1.0 plugin presents a generally positive security posture based on the static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. The code also demonstrates good practices by exclusively using prepared statements for SQL queries and having no file operations or external HTTP requests, which are common vectors for vulnerabilities. However, the lack of nonce checks and capability checks is a notable concern, as these are fundamental WordPress security mechanisms. Furthermore, only 50% of output escaping is properly implemented, indicating potential for cross-site scripting (XSS) vulnerabilities if user-supplied data is ever introduced into the plugin's output.

The plugin's vulnerability history is clean, with no known CVEs or past issues recorded. This, combined with the limited attack surface and good SQL practices, suggests a well-developed plugin from a security perspective. However, the absence of historical vulnerabilities could also be a result of the plugin's limited scope or integration, rather than a guaranteed ongoing security. The critical weakness lies in the implementation of core WordPress security features like nonces and capability checks, which, if exploited, could lead to unauthorized actions.

In conclusion, "popnotifi" v1.0 exhibits strengths in its limited attack surface and secure SQL handling. Its lack of historical vulnerabilities is a positive sign. The primary areas of concern are the missing nonce and capability checks, along with the partial output escaping, which, if exploited, could introduce significant risks. Addressing these specific implementation gaps would greatly enhance the plugin's overall security.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Partial output escaping
Vulnerabilities
None known

PopNotifi Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

PopNotifi Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

50% escaped4 total outputs
Attack Surface

PopNotifi Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_enqueue_scriptspopnotifi.php:12
actionadmin_menupopnotifi.php:13
actionadmin_initpopnotifi.php:14
actionadmin_noticespopnotifi.php:15
actionpublish_postpopnotifi.php:16
Maintenance & Trust

PopNotifi Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedUnknown
PHP min version
Downloads983

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

PopNotifi Developer Profile

popnotifi

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PopNotifi

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
https://popnotifi-cdn.com/lib/

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about PopNotifi