Reportana Security & Risk Analysis

wordpress.org/plugins/reportana

Reportana is a solution for e-commerce that boosts sales, enhances customer communication, automates messaging, and monitors key metrics.

70 active installs v1.4 PHP 7.2+ WP 5.5+ Updated Aug 22, 2025
automationcart-abandonmentemail-and-smswhatsappwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Reportana Safe to Use in 2026?

Generally Safe

Score 100/100

Reportana has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7mo ago
Risk Assessment

The 'reportana' plugin version 1.4 exhibits a generally strong security posture, with excellent practices in output escaping and a lack of documented vulnerabilities. The static analysis shows no direct unauthenticated entry points to AJAX handlers or REST API routes, and all identified entry points have nonce checks. Furthermore, the plugin does not utilize dangerous functions or perform file operations, minimizing common attack vectors.

However, a concerning taint analysis result indicates one flow with an unsanitized path, which is flagged as high severity. While the plugin's SQL query preparedness is at 50%, which is moderate, this combined with the unsanitized path flow warrants careful attention. The absence of capability checks on the AJAX handlers is also a potential weakness, as it relies solely on nonce checks for authorization, which could be bypassed if a nonce is leaked or predictable. The presence of external HTTP requests also introduces a minor risk, although their nature is not specified.

Overall, the plugin's lack of historical vulnerabilities is a positive indicator. Despite this, the identified high-severity taint flow and the absence of capability checks on AJAX handlers present specific areas of risk that should be addressed to further harden its security. The plugin demonstrates good development practices in many areas but has critical points that require immediate review and potential remediation.

Key Concerns

  • High severity taint flow with unsanitized path
  • Missing capability checks on AJAX handlers
  • 50% of SQL queries not using prepared statements
Vulnerabilities
None known

Reportana Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Reportana Code Analysis

Dangerous Functions
0
Raw SQL Queries
7
7 prepared
Unescaped Output
1
33 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

SQL Query Safety

50% prepared14 total queries

Output Escaping

97% escaped34 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

4 flows1 with unsanitized paths
reportana_render_settings_page (reportana.php:185)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Reportana Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_reportana_save_abandoned_checkoutreportana.php:512
noprivwp_ajax_reportana_save_abandoned_checkoutreportana.php:513
WordPress Hooks 4
actionadmin_menureportana.php:174
actionplugins_loadedreportana.php:355
actionwp_enqueue_scriptsreportana.php:380
actionwpreportana.php:579
Maintenance & Trust

Reportana Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedAug 22, 2025
PHP min version7.2
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

Reportana Developer Profile

reportana

1 plugin · 70 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Reportana

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Reportana