Smaily for WP Security & Risk Analysis

wordpress.org/plugins/smaily-for-wp

Smaily newsletter subscription plugin for WordPress

800 active installs v3.1.7 PHP 5.6+ WP 4.0+ Updated Aug 8, 2025
emailmailmarketingsmailywidget
78
B · Generally Safe
CVEs total2
Unpatched1
Last CVEMay 7, 2025
Safety Verdict

Is Smaily for WP Safe to Use in 2026?

Mostly Safe

Score 78/100

Smaily for WP is generally safe to use. 2 past CVEs were resolved.

2 known CVEs 1 unpatched Last CVE: May 7, 2025Updated 9mo ago
Risk Assessment

The "smaily-for-wp" v3.1.7 plugin presents a mixed security posture. While it demonstrates some good practices such as nonce checks and capability checks, and avoids dangerous functions and file operations, significant concerns remain.

The static analysis reveals a notable attack surface with two unprotected AJAX handlers, which are prime targets for unauthorized actions. The plugin's handling of SQL queries and output escaping is also a weakness; 40% of SQL queries are not prepared, and a majority of output (54%) is not properly escaped, increasing the risk of SQL injection and Cross-Site Scripting (XSS) vulnerabilities.

The plugin's vulnerability history, with two known medium-severity CVEs, both related to CSRF and XSS, and one currently unpatched, further exacerbates these concerns. The pattern of past vulnerabilities suggests a recurring issue with input validation and output sanitization, especially concerning user-generated content that might be reflected in the frontend or processed in backend operations. The last vulnerability was recorded in May 2025, indicating a recent historical pattern.

In conclusion, while the plugin avoids some critical security pitfalls, the combination of unprotected entry points, insufficient SQL preparation, and inadequate output escaping, coupled with a history of CSRF and XSS vulnerabilities, warrants careful consideration. The presence of an unpatched vulnerability is a particularly pressing issue. Addressing these areas would significantly improve the plugin's overall security.

Key Concerns

  • Unprotected AJAX handlers
  • SQL queries not using prepared statements
  • Output not properly escaped
  • Currently unpatched CVE
  • Medium severity CVEs in history
Vulnerabilities
2 published

Smaily for WP Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-47684medium · 4.3Cross-Site Request Forgery (CSRF)

Smaily for WP <= 3.1.6 - Cross-Site Request Forgery

May 7, 2025Unpatched
CVE-2024-54286medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Smaily for WP <= 3.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting

Dec 11, 2024 Patched in 3.1.6 (115d)
Code Analysis
Analyzed Mar 16, 2026

Smaily for WP Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
2 prepared
Unescaped Output
41
35 escaped
Nonce Checks
1
Capability Checks
3
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

40% prepared5 total queries

Output Escaping

46% escaped76 total outputs
Attack Surface
2 unprotected

Smaily for WP Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

authwp_ajax_smaily_admin_saveincludes\class-smaily-for-wp.php:168
authwp_ajax_smaily_for_wp_dismiss_deprecation_noticeincludes\class-smaily-for-wp.php:169

Shortcodes 1

[smaily_for_wp_newsletter_form] public\class-smaily-for-wp-public.php:60
WordPress Hooks 12
actionplugins_loadedincludes\class-smaily-for-wp.php:124
actioninitincludes\class-smaily-for-wp.php:135
actionplugins_loadedincludes\class-smaily-for-wp.php:152
actionupgrader_process_completeincludes\class-smaily-for-wp.php:153
actionadmin_enqueue_scriptsincludes\class-smaily-for-wp.php:165
actionadmin_enqueue_scriptsincludes\class-smaily-for-wp.php:166
actionadmin_enqueue_scriptsincludes\class-smaily-for-wp.php:167
actionwidgets_initincludes\class-smaily-for-wp.php:170
actionadmin_menuincludes\class-smaily-for-wp.php:171
actionadmin_noticesincludes\class-smaily-for-wp.php:172
filterplugin_row_metaincludes\class-smaily-for-wp.php:174
actioninitincludes\class-smaily-for-wp.php:186
Maintenance & Trust

Smaily for WP Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedAug 8, 2025
PHP min version5.6
Downloads45K

Community Trust

Rating0/100
Number of ratings0
Active installs800
Developer Profile

Smaily for WP Developer Profile

Smaily

4 plugins · 2K total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
115 days
View full developer profile
Detection Fingerprints

How We Detect Smaily for WP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/smaily-for-wp/admin/css/smaily-for-wp-admin.css/wp-content/plugins/smaily-for-wp/admin/js/smaily-for-wp-admin.js
Script Paths
/wp-content/plugins/smaily-for-wp/admin/js/smaily-for-wp-admin.js
Version Parameters
smaily-for-wp/admin/css/smaily-for-wp-admin.css?ver=smaily-for-wp/admin/js/smaily-for-wp-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
smaily-for-wp-admin-deprecation-notice
HTML Comments
<!-- DEPRECATION NOTICE! --><!-- Smaily for WordPress is officially deprecated and will no longer receive updates or security patches. --><!-- Please uninstall this plugin and switch to Smaily Connect — our new, combined plugin with support for WordPress, WooCommerce, Contact Form 7 and Elementor. --><!-- Next steps: Deactivate and delete Smaily for WordPress → install Smaily Connect → reconnect your Smaily account. -->
Data Attributes
id="smaily-for-wp-admin-deprecation-notice"
JS Globals
smaily_for_wp
FAQ

Frequently Asked Questions about Smaily for WP