Popup dropping box Security & Risk Analysis

wordpress.org/plugins/popup-dropping-box

This popup plugin drops your text in the popup window. So that the text on the popup window in your page gets the attention to your users.

0 active installs v1.5 PHP 5.0+ WP 5.0+ Updated Unknown
droppingpop-uppopupwidget
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Popup dropping box Safe to Use in 2026?

Generally Safe

Score 100/100

Popup dropping box has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'popup-dropping-box' plugin v1.5 exhibits a generally good security posture due to the absence of known vulnerabilities and a responsible approach to SQL query preparation. The static analysis indicates a limited attack surface with only one shortcode as an entry point, and importantly, no unprotected AJAX handlers or REST API routes were identified, which are common vectors for exploits. Furthermore, the code avoids file operations and external HTTP requests, reducing potential attack avenues.

However, there are areas for improvement. The output escaping mechanism is only properly implemented in 58% of cases, indicating a moderate risk of Cross-Site Scripting (XSS) vulnerabilities. While no critical or high-severity taint flows were detected, this partial unescaped output could still allow for low-to-medium severity XSS. The plugin also includes 3 nonce checks, but crucially, no capability checks are performed. This means that while some actions are protected against replay attacks, they are not verified to be performed by authorized users, potentially leading to privilege escalation or unauthorized actions if an attacker can trick a logged-in user into triggering the shortcode.

The lack of any historical vulnerabilities is a positive sign, suggesting a consistent focus on security by the developers. However, this should not lead to complacency. The existing weakness in output escaping and the absence of capability checks represent concrete risks that should be addressed to further harden the plugin's security.

Key Concerns

  • Unescaped output detected
  • Missing capability checks on entry points
Vulnerabilities
None known

Popup dropping box Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Popup dropping box Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
18 prepared
Unescaped Output
36
49 escaped
Nonce Checks
3
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

90% prepared20 total queries

Output Escaping

58% escaped85 total outputs
Attack Surface

Popup dropping box Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[popupdbox] popup-dropping-box.php:34
WordPress Hooks 4
actionwp_enqueue_scriptspopup-dropping-box.php:36
actionplugins_loadedpopup-dropping-box.php:37
actionadmin_enqueue_scriptspopup-dropping-box.php:38
actionadmin_menupopup-dropping-box.php:39
Maintenance & Trust

Popup dropping box Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedUnknown
PHP min version5.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Popup dropping box Developer Profile

gopiplus

52 plugins · 19K total installs

76
trust score
Avg Security Score
83/100
Avg Patch Time
70 days
View full developer profile
Detection Fingerprints

How We Detect Popup dropping box

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/popup-dropping-box/inc/jquery.easing.1.3.js/wp-content/plugins/popup-dropping-box/inc/popup-dropping-box.js
Script Paths
/wp-content/plugins/popup-dropping-box/pages/setting.js

HTML / DOM Fingerprints

JS Globals
popupdbox_select_params
Shortcode Output
[popupdbox]
FAQ

Frequently Asked Questions about Popup dropping box