Pusher – Pushing mobile notification with FCM Security & Risk Analysis

wordpress.org/plugins/pusher-pushing-mobile-notifications-with-fcm

If your wordpress site has a mobile application, you can push a notification to the users of your mobile application via this plugin.

0 active installs v1.0.0 PHP 5.2+ WP 4.7+ Updated Unknown
androidfirebaseiosmobilenotification
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Pusher – Pushing mobile notification with FCM Safe to Use in 2026?

Generally Safe

Score 100/100

Pusher – Pushing mobile notification with FCM has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "pusher-pushing-mobile-notifications-with-fcm" plugin version 1.0.0 exhibits a mixed security posture. On the positive side, the static analysis reveals a very limited attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events exposed without proper authentication or permission checks. Furthermore, there are no recorded historical vulnerabilities (CVEs), which suggests a history of good security practices or a lack of targeted exploitation.

However, significant concerns arise from the code signals. The plugin uses raw SQL queries without prepared statements for 100% of its database interactions. This is a critical flaw that can lead to SQL injection vulnerabilities, especially if user-supplied data is directly incorporated into these queries. Additionally, none of the output escaping is properly implemented, meaning that sensitive data displayed to users could be vulnerable to cross-site scripting (XSS) attacks. The taint analysis also flags two flows with unsanitized paths, indicating potential data leakage or manipulation vulnerabilities that require further investigation. The lack of nonce checks on any entry points, while the attack surface is currently zero, could become a problem if future updates introduce new handlers.

In conclusion, while the plugin has a clean vulnerability history and a seemingly small attack surface, the presence of unescaped output and raw SQL queries without prepared statements presents a significant security risk. The taint analysis further underscores potential vulnerabilities. It is crucial that these code-level issues are addressed to improve the plugin's overall security.

Key Concerns

  • SQL queries not using prepared statements
  • Output escaping not properly implemented
  • Flows with unsanitized paths detected
  • No nonce checks on any entry points
Vulnerabilities
None known

Pusher – Pushing mobile notification with FCM Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Pusher – Pushing mobile notification with FCM Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
10
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
2
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

0% escaped10 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
pusherfcm_admin_dashboard (includes\Helpers\menus\dashboard.php:2)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Pusher – Pushing mobile notification with FCM Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_enqueue_scriptsincludes\Helpers\actions.php:3
actionadmin_menuincludes\Helpers\actions.php:5
actionwp_insert_postincludes\Helpers\actions.php:7
Maintenance & Trust

Pusher – Pushing mobile notification with FCM Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedUnknown
PHP min version5.2
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Pusher – Pushing mobile notification with FCM Developer Profile

Kemal YAZICI

3 plugins · 150 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Pusher – Pushing mobile notification with FCM

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pusher-pushing-mobile-notifications-with-fcm/includes/css/admin-style.css
Version Parameters
pusher-pushing-mobile-notifications-with-fcm/includes/css/admin-style.css?v=pusher-pushing-mobile-notifications-with-fcm/includes/css/admin-style.css?v=1.0

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Pusher – Pushing mobile notification with FCM