POWR Popup Security & Risk Analysis

wordpress.org/plugins/powr-popup

Amplify landing page conversions with a custom popup window, displayed immediately or when visitor leaves the page.

20 active installs v2.1.0 PHP 7.4+ WP 3.0+ Updated Apr 21, 2025
exit-intentlead-collectionpopuppopup-formsignup
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is POWR Popup Safe to Use in 2026?

Generally Safe

Score 92/100

POWR Popup has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The static analysis ofpowr-popup v2.1.0 reveals a plugin with an exceptionally small attack surface and generally good coding practices. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, which significantly limits potential entry points for attackers. Furthermore, the code demonstrates a commitment to security by using prepared statements for all SQL queries and properly escaping all output. The absence of dangerous functions, file operations, and external HTTP requests further contributes to a positive security posture.

Despite these strengths, the taint analysis identified two flows with unsanitized paths. While the static analysis did not flag these as critical or high severity, unsanitized paths can still represent a risk if they are accessible via any of the plugin's (currently zero) entry points or if an attacker can indirectly influence the path. The vulnerability history is also notably clean, with no recorded CVEs, which is a very strong indicator of a well-maintained and secure plugin over time.

In conclusion,powr-popup v2.1.0 appears to be a robust and secure plugin based on the provided data. The lack of an attack surface and the adherence to secure coding principles for SQL and output are commendable. The primary area of concern, albeit minor given the lack of entry points, is the presence of unsanitized paths. However, given the absence of any known vulnerabilities and the minimal attack surface, the overall risk is low.

Key Concerns

  • Taint flow with unsanitized path
  • Taint flow with unsanitized path
Vulnerabilities
None known

POWR Popup Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

POWR Popup Release Timeline

v2.1.0Current
v2.0.1
v2.0.0
Code Analysis
Analyzed Mar 16, 2026

POWR Popup Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped6 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
powrio_powr_popup_options (powr-popup.php:64)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

POWR Popup Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_enqueue_scriptspowr-popup.php:92
actionwp_dashboard_setuppowr-popup.php:104
actionadmin_noticespowr-popup.php:144
actionadmin_menupowr-popup.php:156
Maintenance & Trust

POWR Popup Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 21, 2025
PHP min version7.4
Downloads11K

Community Trust

Rating74/100
Number of ratings3
Active installs20
Developer Profile

POWR Popup Developer Profile

POWR

5 plugins · 1K total installs

82
trust score
Avg Security Score
92/100
Avg Patch Time
65 days
View full developer profile
Detection Fingerprints

How We Detect POWR Popup

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/powr-popup/src/css/admin-style.css
Version Parameters
powr-popup/src/css/admin-style.css?ver=

HTML / DOM Fingerprints

Data Attributes
data-powrio-embedded-iframe
FAQ

Frequently Asked Questions about POWR Popup