SendPulse Free Web Push Security & Risk Analysis

wordpress.org/plugins/sendpulse-web-push

Web push notifications for your website. Available in Chrome (Android and desktop), Firefox (Android and desktop) and Safari (desktop).

600 active installs v1.3.9 PHP 5.6+ WP 5.7+ Updated Sep 22, 2025
desktop-notificationsmobile-notificationspush-notificationsweb-push-notificationswebpush
98
A · Safe
CVEs total2
Unpatched0
Last CVEOct 16, 2024
Safety Verdict

Is SendPulse Free Web Push Safe to Use in 2026?

Generally Safe

Score 98/100

SendPulse Free Web Push has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

2 known CVEsLast CVE: Oct 16, 2024Updated 7mo ago
Risk Assessment

The sendpulse-web-push plugin version 1.3.9 presents a mixed security posture. On the positive side, static analysis reveals no direct entry points like AJAX handlers, REST API routes, or shortcodes that lack authentication. The plugin also demonstrates good practices by exclusively using prepared statements for SQL queries and not making external HTTP requests. This suggests a generally well-defined and controlled interaction with the WordPress core and external services.

However, concerns arise from the output escaping. With 41% of 34 outputs properly escaped, there's a significant portion (59%) that may be vulnerable to cross-site scripting (XSS) attacks if user-supplied data is not adequately sanitized before being displayed. The vulnerability history also reveals two past CVEs, including a high-severity XSS and a medium-severity CSRF, indicating a recurring pattern of input sanitization and authorization issues. While currently unpatched CVEs are zero, the existence of past vulnerabilities, especially XSS, suggests a need for vigilance in code quality and input validation.

In conclusion, while the plugin avoids common pitfalls like raw SQL or a large, unprotected attack surface, the insufficient output escaping and past XSS vulnerabilities are significant weaknesses. The lack of capability checks on the identified entry points is also a concern, despite there being no unprotected entry points. Users should be aware of the potential for XSS and CSRF and ensure they are using the latest patched versions of the plugin.

Key Concerns

  • High percentage of unescaped output
  • History of high severity vulnerability (XSS)
  • History of medium severity vulnerability (CSRF)
  • No capability checks on entry points
Vulnerabilities
2 published

SendPulse Free Web Push Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

High
1
Medium
1

2 total CVEs

CVE-2024-9184high · 7.2Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

SendPulse Free Web Push <= 1.3.6 - Unauthenticated Stored Cross-Site Scripting

Oct 16, 2024 Patched in 1.3.7 (1d)
CVE-2023-45274medium · 4.3Cross-Site Request Forgery (CSRF)

SendPulse Free Web Push <= 1.3.1 - Cross-Site Request Forgery via sendpulse_config

Oct 6, 2023 Patched in 1.3.3 (161d)
Version History

SendPulse Free Web Push Release Timeline

v1.3.9Current
v1.3.8
v1.3.7
v1.3.61 CVE
v1.3.51 CVE
v1.3.41 CVE
v1.3.31 CVE
Code Analysis
Analyzed Mar 16, 2026

SendPulse Free Web Push Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
20
14 escaped
Nonce Checks
1
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

41% escaped34 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
sendpulse_config (settings.php:9)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

SendPulse Free Web Push Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionadmin_menuinit.php:45
actionadmin_assetsinit.php:46
actionadmin_noticessendpulse-webpush.php:22
actionwp_headsendpulse-webpush.php:24
actionlogin_enqueue_scriptssendpulse-webpush.php:25
actionwp_footersendpulse-webpush.php:45
actionlogin_enqueue_scriptssendpulse-webpush.php:46
actionuser_registersendpulse-webpush.php:74
filterplugin_row_metasendpulse-webpush.php:128
Maintenance & Trust

SendPulse Free Web Push Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedSep 22, 2025
PHP min version5.6
Downloads34K

Community Trust

Rating100/100
Number of ratings9
Active installs600
Developer Profile

SendPulse Free Web Push Developer Profile

SendPulse

5 plugins · 2K total installs

87
trust score
Avg Security Score
99/100
Avg Patch Time
39 days
View full developer profile
Detection Fingerprints

How We Detect SendPulse Free Web Push

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sendpulse-web-push/css/style.css/wp-content/plugins/sendpulse-web-push/js/utils.js
Script Paths
https://sendpulse.com/integrations/cms/wordpress/scripts/sendpulse.php/wp-content/plugins/sendpulse-web-push/js/utils.js
Version Parameters
sendpulse-web-push/css/style.css?ver=sendpulse-web-push/js/utils.js?ver=

HTML / DOM Fingerprints

CSS Classes
sendpulse-web-push
Data Attributes
data-sendpulse-web-push
JS Globals
oSpPdomReady
FAQ

Frequently Asked Questions about SendPulse Free Web Push