sendMeMsg Security & Risk Analysis

wordpress.org/plugins/sendmemsg

This plugin provide a widget button that allow users to send direct message to you whatsapp account , you can change the number who you users send to …

0 active installs v1.0.0 PHP 7.0+ WP 4.7+ Updated Nov 23, 2020
buttondirect-messageinteractivewhatsapp
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is sendMeMsg Safe to Use in 2026?

Generally Safe

Score 85/100

sendMeMsg has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "sendmemsg" v1.0.0 plugin exhibits a very strong security posture. The static analysis reveals an extremely limited attack surface with zero entry points identified, meaning there are no directly exposed AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests is commendable. The code also demonstrates good practices in its SQL queries, with 100% utilizing prepared statements, and a high percentage (86%) of its outputs are properly escaped, which is a significant mitigation against cross-site scripting (XSS) vulnerabilities. The taint analysis finding zero flows with unsanitized paths further reinforces this positive assessment.

However, a notable concern is the complete absence of nonce checks and capability checks. While the current attack surface is zero, any future additions or modifications that introduce new entry points without these fundamental security mechanisms would immediately introduce significant vulnerabilities, particularly for AJAX and REST API interactions. The vulnerability history being entirely clear is a strong positive indicator of diligent development and maintenance, suggesting a commitment to security. In conclusion, "sendmemsg" v1.0.0 is currently very secure due to its limited attack surface and good coding practices. The primary weakness lies in the lack of built-in security checks like nonces and capability checks, which, if left unaddressed, could become a critical security flaw if the plugin's functionality expands.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
  • Low percentage of output escaping (86%)
Vulnerabilities
None known

sendMeMsg Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

sendMeMsg Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
18 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

86% escaped21 total outputs
Attack Surface

sendMeMsg Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_enqueue_scriptsincludes\sendmemsg-scripts.php:16
actionwidgets_initsendMeMsg.php:25
Maintenance & Trust

sendMeMsg Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedNov 23, 2020
PHP min version7.0
Downloads860

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

sendMeMsg Developer Profile

Ofek Nakar

8 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect sendMeMsg

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sendmemsg/includes/sendmemsg-scripts.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about sendMeMsg