Pushly Security & Risk Analysis

wordpress.org/plugins/pushly

Take user engagement to a whole new level with an easy-to-use platform to engage audiences with targeted content after they leave your site.

900 active installs v2.1.9 PHP 5.6.20+ WP 6.1+ Updated Dec 3, 2025
push-notificationspushlyweb-pushweb-push-notifications
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Pushly Safe to Use in 2026?

Generally Safe

Score 100/100

Pushly has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The Pushly v2.1.9 plugin exhibits a generally strong security posture, with no known vulnerabilities or CVEs recorded. The static analysis reveals a small attack surface, with all identified entry points (REST API routes) including permission callbacks. The plugin also demonstrates good practices by exclusively using prepared statements for SQL queries. However, the presence of the `unserialize` function, which is known to be dangerous if used with untrusted input, is a significant concern. Furthermore, only 65% of output is properly escaped, indicating a potential for cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled with sufficient care before being displayed. The lack of nonce checks on any potential AJAX handlers, although currently no AJAX handlers are present, could become a risk if new ones are added without proper security measures. The plugin does not bundle external libraries, which is a positive aspect. The absence of taint analysis results is noted but doesn't necessarily indicate a lack of issues, as this functionality may not have been comprehensively applied or the results were null.

Key Concerns

  • Dangerous function used (unserialize)
  • Insufficient output escaping (35% unescaped)
  • No nonce checks found
Vulnerabilities
None known

Pushly Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Pushly Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
6
11 escaped
Nonce Checks
0
Capability Checks
2
File Operations
1
External Requests
5
Bundled Libraries
0

Dangerous Functions Found

unserialize$meta['pushly_audience_ids'] = unserialize( $meta['pushly_audience_ids'] );includes\admin\class-pushly-admin-post.php:610

Output Escaping

65% escaped17 total outputs
Attack Surface

Pushly Attack Surface

Entry Points1
Unprotected0

REST API Routes 1

GET/wp-json/pushly/v1/segmentsincludes\admin\class-pushly-admin-post.php:668
WordPress Hooks 20
actionadmin_initincludes\admin\class-pushly-admin-post.php:41
actionrest_api_initincludes\admin\class-pushly-admin-post.php:42
actionenqueue_block_editor_assetsincludes\admin\class-pushly-admin-post.php:43
actionadmin_enqueue_scriptsincludes\admin\class-pushly-admin-post.php:44
actiontransition_post_statusincludes\admin\class-pushly-admin-post.php:47
actionadd_meta_boxesincludes\admin\class-pushly-admin-post.php:48
actionadmin_noticesincludes\admin\class-pushly-admin-post.php:49
actionrest_api_initincludes\admin\class-pushly-admin-post.php:52
actionwp_insert_postincludes\admin\class-pushly-admin-post.php:360
actionwp_insert_postincludes\admin\class-pushly-admin-post.php:375
actionadmin_menuincludes\admin\class-pushly-admin-settings.php:25
actionrest_api_initincludes\admin\class-pushly-admin-settings.php:26
actionadmin_initincludes\admin\class-pushly-admin-settings.php:27
actionadmin_noticesincludes\admin\class-pushly-admin-settings.php:28
actionadmin_enqueue_scriptsincludes\admin\class-pushly-admin-settings.php:29
actionwp_headincludes\public\class-pushly-public.php:28
filterscript_loader_tagincludes\public\class-pushly-public.php:29
actioninitpushly.php:26
actioninitpushly.php:27
actioninitpushly.php:30
Maintenance & Trust

Pushly Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 3, 2025
PHP min version5.6.20
Downloads34K

Community Trust

Rating0/100
Number of ratings0
Active installs900
Developer Profile

Pushly Developer Profile

pushlydev

1 plugin · 900 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Pushly

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pushly/build/meta-box.js/wp-content/plugins/pushly/build/meta-box.css/wp-content/plugins/pushly/includes/admin/views/classic/meta-box.js
Version Parameters
pushly/build/meta-box.js?ver=pushly/build/meta-box.css?ver=

HTML / DOM Fingerprints

Data Attributes
data-pushly-notification-iddata-pushly-send-notificationdata-pushly-custom-titledata-pushly-custom-bodydata-pushly-customize-audiencedata-pushly-audience-ids
JS Globals
pushlyData
REST Endpoints
/wp-json/pushly/v1/post-meta
FAQ

Frequently Asked Questions about Pushly