SC Popup Subscriber Form Security & Risk Analysis

wordpress.org/plugins/sc-popup-subscriber-form

jQuery Popup Feedburner Subscriber Form.

10 active installs v1.2 PHP + WP 3.0+ Updated Jul 6, 2014
jquery-popup-feedburner-subscriber-form
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SC Popup Subscriber Form Safe to Use in 2026?

Generally Safe

Score 85/100

SC Popup Subscriber Form has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "sc-popup-subscriber-form" plugin version 1.2 exhibits a mixed security posture. On the positive side, it has a zero attack surface through AJAX, REST API, shortcodes, and cron events, with no known past vulnerabilities. The plugin also correctly uses prepared statements for all SQL queries and performs file operations and external HTTP requests with no observed issues. The presence of a nonce check is also a good indicator of security awareness.

However, several concerning signals emerge from the static analysis. The use of the `unserialize` function without apparent sanitization presents a significant risk. If this function is exposed to user-controlled input, it could lead to remote code execution or denial-of-service vulnerabilities. Furthermore, only 25% of output is properly escaped, indicating a high potential for cross-site scripting (XSS) vulnerabilities if any of the unescaped outputs are rendered with user-supplied data. The absence of capability checks on any potential entry points, though the attack surface is currently zero, is a structural weakness that could become problematic if new entry points are added without corresponding security measures.

In conclusion, while the plugin has a clean vulnerability history and employs some good security practices like prepared statements and nonce checks, the identified risks with `unserialize` and unescaped output are substantial. These could be exploited if the plugin interacts with user input in a way that is not evident from the provided data. A thorough review of how `unserialize` is used and what data is being outputted is strongly recommended.

Key Concerns

  • Dangerous function unserialize used
  • Low output escaping (25%)
  • Missing capability checks
Vulnerabilities
None known

SC Popup Subscriber Form Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

SC Popup Subscriber Form Release Timeline

v1.2Current
v1.1
v1.0
Code Analysis
Analyzed Apr 16, 2026

SC Popup Subscriber Form Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
6
2 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$options = unserialize(get_option("sc_popup_subscriber_form_options"));sc-popup-subscriber-form.php:129

Output Escaping

25% escaped8 total outputs
Attack Surface

SC Popup Subscriber Form Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_enqueue_scriptssc-popup-subscriber-form.php:156
filterwp_headsc-popup-subscriber-form.php:157
actionadmin_menusc-popup-subscriber-form.php:158
actionwp_enqueue_scriptssc-popup-subscriber-form.php:159
actionwp_footersc-popup-subscriber-form.php:160
Maintenance & Trust

SC Popup Subscriber Form Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedJul 6, 2014
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Alternatives

SC Popup Subscriber Form Alternatives

No alternatives data available yet.

Developer Profile

SC Popup Subscriber Form Developer Profile

Anas Mir

5 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SC Popup Subscriber Form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sc-popup-subscriber-form/sc-popup-subscriber-form.css
Version Parameters
sc-popup-subscriber-form/sc-popup-subscriber-form.css?ver=

HTML / DOM Fingerprints

CSS Classes
sc-modelbox-subscriber-bgsc-model-boxsc-model-closesc-model-headingsc-model-detailsc-model-credit
Data Attributes
id="sc-modelbox-subscriber-bg"id="mailing-list"class="sc-model-box wrapper"class="inside blue"class="sc-model-close black"class="sc-model-heading"+2 more
JS Globals
createCookiereadCookie
FAQ

Frequently Asked Questions about SC Popup Subscriber Form