Onsite Messaging by PushAlert – Exit Intent Popups, Email Optins, Discount Overlays Security & Risk Analysis

wordpress.org/plugins/pushalert-onsite-messaging

A plugin by PushAlert to enable onsite messaging for your WordPress and WooCommerce Store to build email list, boost sales and recover abandoned cart.

60 active installs v1.2.0 PHP 5.6+ WP 2.7+ Updated Dec 1, 2025
exit-intent-popupsonsite-messagingpopupsrecover-abandoned-cartwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Onsite Messaging by PushAlert – Exit Intent Popups, Email Optins, Discount Overlays Safe to Use in 2026?

Generally Safe

Score 100/100

Onsite Messaging by PushAlert – Exit Intent Popups, Email Optins, Discount Overlays has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The pushalert-onsite-messaging plugin version 1.2.0 exhibits a strong security posture based on the provided static analysis. The absence of any identified entry points (AJAX handlers, REST API routes, shortcodes, cron events) significantly limits the plugin's attack surface. Furthermore, the code demonstrates good security practices by using prepared statements for all SQL queries, which prevents SQL injection vulnerabilities. The high percentage of properly escaped output (82%) is also a positive indicator, though the remaining 18% could potentially be a vector for cross-site scripting (XSS) if user-controlled data is involved in those unescaped outputs.

The vulnerability history is completely clean, with no recorded CVEs. This indicates a consistent track record of secure development or prompt patching of any past issues. The taint analysis revealing no unsanitized paths further reinforces the impression of well-handled data flows within the plugin. The presence of a nonce check is a good practice for preventing CSRF attacks on any potential actions that might exist, although the lack of identified entry points makes its immediate application less critical. However, the complete absence of capability checks is a notable concern, as it means that any actions or functionalities within the plugin might be accessible to users who should not have such permissions, especially if hidden entry points were to be discovered or if future updates introduce them without proper authorization.

Overall, the plugin appears to be developed with security in mind, particularly regarding common web vulnerabilities like SQL injection and XSS. Its minimal attack surface and lack of historical vulnerabilities are significant strengths. The primary area for improvement lies in the implementation of capability checks to ensure granular access control. While the current findings are positive, it's important to remember that static analysis is not exhaustive and might miss certain dynamic vulnerabilities or logic flaws.

Key Concerns

  • No capability checks implemented
  • 18% of output not properly escaped
Vulnerabilities
None known

Onsite Messaging by PushAlert – Exit Intent Popups, Email Optins, Discount Overlays Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Onsite Messaging by PushAlert – Exit Intent Popups, Email Optins, Discount Overlays Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
9 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

82% escaped11 total outputs
Attack Surface

Onsite Messaging by PushAlert – Exit Intent Popups, Email Optins, Discount Overlays Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_initpushalert-onsite-messaging.php:11
actionadmin_noticespushalert-onsite-messaging.php:12
actionwp_footerpushalert-onsite-messaging.php:13
actionwp_footerpushalert-onsite-messaging.php:19
actionwoocommerce_thankyoupushalert-onsite-messaging.php:26
actionadmin_menupushalert-onsite-messaging.php:27
filteradmin_footer_textpushalert-onsite-messaging.php:158
filterwoocommerce_rest_prepare_product_objectpushalert-onsite-messaging.php:285
Maintenance & Trust

Onsite Messaging by PushAlert – Exit Intent Popups, Email Optins, Discount Overlays Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 1, 2025
PHP min version5.6
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs60
Developer Profile

Onsite Messaging by PushAlert – Exit Intent Popups, Email Optins, Discount Overlays Developer Profile

PushAlert

2 plugins · 1K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Onsite Messaging by PushAlert – Exit Intent Popups, Email Optins, Discount Overlays

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pushalert-onsite-messaging/style.css
Script Paths
/wp-content/plugins/pushalert-onsite-messaging/js/pa-onsite-messaging.js
Version Parameters
pushalert-onsite-messaging/style.css?ver=pa-onsite-messaging.js?ver=

HTML / DOM Fingerprints

CSS Classes
wc-rating-link
HTML Comments
<!-- Onsite Messaging 1.2.0 -->
Data Attributes
data-rated
JS Globals
onsitemessagingbypa
FAQ

Frequently Asked Questions about Onsite Messaging by PushAlert – Exit Intent Popups, Email Optins, Discount Overlays