
Push7 Security & Risk Analysis
wordpress.org/plugins/push7Web Push Notification Service for your website. Now available for Android, iOS, Chrome and Firefox. We will soon support Safari and other platforms.
Is Push7 Safe to Use in 2026?
Generally Safe
Score 85/100Push7 has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "push7" plugin version 3.0.7 demonstrates a generally strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, which significantly minimizes the potential attack surface. Furthermore, the absence of dangerous functions, raw SQL queries, file operations, and critical or high severity taint flows is highly encouraging. The plugin also appears to not bundle external libraries, further reducing potential risks from outdated dependencies.
However, there are a few areas for concern. The output escaping is only properly handled for 47% of the identified outputs, meaning a significant portion of data might be vulnerable to Cross-Site Scripting (XSS) attacks if user-supplied data is not adequately sanitized before display. Additionally, the lack of nonce checks and capability checks on any entry points, coupled with no recorded vulnerability history, could indicate that either the plugin has been exceptionally well-maintained or that the analysis tools may not have detected potential weaknesses in these areas. The presence of external HTTP requests, while not inherently insecure, warrants attention to ensure these requests are made to trusted sources and that the data exchanged is handled securely.
In conclusion, "push7" v3.0.7 has a commendable baseline security due to its limited attack surface and avoidance of common high-risk coding practices. The primary weakness lies in the insufficient output escaping, which presents a clear risk of XSS vulnerabilities. While the absence of a vulnerability history is positive, the lack of security checks on potential entry points means that any vulnerabilities that might exist could be more easily exploited. Continued vigilance in output escaping and exploring the implementation of proper authorization checks would further enhance its security.
Key Concerns
- Insufficient output escaping (47% proper)
- No nonce checks found
- No capability checks found
Push7 Security Vulnerabilities
Push7 Code Analysis
Output Escaping
Push7 Attack Surface
WordPress Hooks 7
Maintenance & Trust
Push7 Maintenance & Trust
Maintenance Signals
Community Trust
Push7 Alternatives
Web Push Notifications by Aimtell
aimtell-web-push-notifications
Aimtell enables users to re-engage their website visitors with highly targeted mobile & desktop web push notifications.
DigitalPUSH notifications
digitalpush
This plugin allows you to to implement push notifications with your WordPress blog.
Notificare
notificare-website-push
Smart push notifications for WordPress websites.
WorldShaking Web Push Notifications
push-notification-worldshaking
Increase engagement and drive more repeat traffic to your WordPress site with desktop push notifications. Now supporting Chrome, Firefox, and Safari.
Push World
push-world
This plugin help send personal and mass push notifications. It also can return customers to abandoned WooCommerce cart through push notifications.
Push7 Developer Profile
1 plugin · 800 total installs
How We Detect Push7
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/push7/js/admin.js/wp-content/plugins/push7/js/settings.js/wp-content/plugins/push7/js/categories.jspush7/style.css?ver=push7/admin.js?ver=push7/settings.js?ver=push7/categories.js?ver=HTML / DOM Fingerprints
push7_notify_checkbox<!-- Push7 通知設定 -->name='push7_not_notify'value='true'name='metabox_exist'p7.init