Slide to Subscribe Security & Risk Analysis

wordpress.org/plugins/slide-to-subscribe

Allow people to subscribe to your newsletter with just a slide. Works with any newsletter or website, extremely easy setup.

10 active installs v1.1 PHP 5.2.4+ WP 3.1+ Updated Mar 1, 2020
emailformleadsmarketingnewsletter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Slide to Subscribe Safe to Use in 2026?

Generally Safe

Score 85/100

Slide to Subscribe has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The slide-to-subscribe v1.1 plugin exhibits a generally good security posture regarding its attack surface and the absence of known vulnerabilities. The static analysis reveals a minimal attack surface with only one shortcode and no AJAX handlers or REST API routes that are accessible without authentication. Furthermore, the plugin demonstrates strong practices by exclusively using prepared statements for SQL queries and having no recorded vulnerabilities, which indicates a history of security diligence.

However, a significant concern arises from the complete lack of output escaping for all identified outputs. This means that any data rendered by the plugin, even if originating from trusted sources, could potentially be injected with malicious code, leading to cross-site scripting (XSS) vulnerabilities. While taint analysis shows no unsanitized paths, the absence of output escaping creates a direct and easily exploitable avenue for XSS if user-supplied or dynamic data is ever displayed without proper sanitization. The lack of nonce checks, while not directly indicated as a risk in this analysis due to the absence of relevant entry points, remains a general best practice to consider for future development.

Key Concerns

  • 0% output escaping
  • 0 nonce checks
Vulnerabilities
None known

Slide to Subscribe Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Slide to Subscribe Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Attack Surface

Slide to Subscribe Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[slide-to-subscribe] slide-to-subscribe.php:38
WordPress Hooks 5
filterthe_contentslide-to-subscribe.php:41
actionwp_headslide-to-subscribe.php:45
actionactivated_pluginslide-to-subscribe.php:47
actionadmin_initslide-to-subscribe.php:64
actionadmin_menuslide-to-subscribe.php:66
Maintenance & Trust

Slide to Subscribe Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedMar 1, 2020
PHP min version5.2.4
Downloads1K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

Slide to Subscribe Developer Profile

andreitp1

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Slide to Subscribe

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/slide-to-subscribe/slide-to-subscribe.php

HTML / DOM Fingerprints

CSS Classes
s2s_widget_em
Data Attributes
name="s2s_widget_id"name="s2s_display_posts"name="s2s_widget_height"name="s2s_widget_width"name="s2s_display_floating"id="s2s_widget_id"+4 more
JS Globals
s2s_widget_ids2s_script
Shortcode Output
[slide-to-subscribe]
FAQ

Frequently Asked Questions about Slide to Subscribe