SMS Partner Security & Risk Analysis

wordpress.org/plugins/sms-partner

Activer l'A2F ou la connexion via Numéro de téléphone sur votre WordPress grâce à SMS Partner

0 active installs v2.6 PHP 7.4+ WP 5.3+ Updated Mar 18, 2025
authenticationloginsecuritysmstwo-factor-authentication
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SMS Partner Safe to Use in 2026?

Generally Safe

Score 92/100

SMS Partner has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "sms-partner" plugin version 2.6 exhibits a concerning security posture primarily due to its unprotected entry points. While the plugin demonstrates good practices in output escaping, SQL query preparation, and avoids dangerous functions and file operations, the presence of four AJAX handlers without authentication checks represents a significant vulnerability. This lack of authorization could allow unauthenticated users to trigger plugin functionality, potentially leading to unintended actions or information disclosure.

The taint analysis reveals two flows with unsanitized paths, flagged as high severity. This indicates that data processed through these flows might not be adequately validated or sanitized before being used, potentially opening the door for cross-site scripting (XSS) or other injection attacks if these unsanitized paths are reachable by unauthenticated users. Despite these identified risks, the plugin has no recorded history of CVEs, suggesting either a lack of past vulnerabilities or a successful track record of patching if they occurred. However, the current static analysis findings highlight immediate areas for improvement.

In conclusion, while the "sms-partner" plugin has strengths in secure coding practices like output escaping and prepared SQL statements, the high number of unprotected AJAX endpoints and critical taint flows demand urgent attention. The absence of past CVEs is positive but does not negate the present risks identified in the code analysis. Addressing these unprotected entry points and sanitizing the identified data flows is crucial for enhancing the plugin's overall security.

Key Concerns

  • 4 unprotected AJAX handlers
  • 2 unsanitized taint flows (high severity)
Vulnerabilities
None known

SMS Partner Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SMS Partner Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
7 prepared
Unescaped Output
0
96 escaped
Nonce Checks
9
Capability Checks
1
File Operations
0
External Requests
3
Bundled Libraries
0

SQL Query Safety

64% prepared11 total queries

Output Escaping

100% escaped96 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

8 flows2 with unsanitized paths
a2f_form (core\a2f.php:214)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
4 unprotected

SMS Partner Attack Surface

Entry Points4
Unprotected4

AJAX Handlers 4

authwp_ajax_destroy_sessioncore\a2f.php:27
noprivwp_ajax_destroy_sessioncore\a2f.php:28
authwp_ajax_destroy_sessioncore\login_sms.php:28
noprivwp_ajax_destroy_sessioncore\login_sms.php:29
WordPress Hooks 21
filterauthenticatecore\a2f.php:21
actioninitcore\a2f.php:22
actionlogin_initcore\a2f.php:23
actiona2f_formcore\a2f.php:24
actionadmin_noticescore\a2f.php:25
actionadmin_noticescore\a2f.php:26
actionwp_enqueue_scriptscore\a2f.php:29
actioninitcore\login_sms.php:25
actioninitcore\login_sms.php:26
actionlogin_sms_formcore\login_sms.php:27
actionlogin_enqueue_scriptscore\login_sms.php:30
actionwp_enqueue_scriptscore\login_sms.php:34
filterstyle_loader_srccore\login_sms.php:35
actionadmin_menucore\menuAdmin.php:17
actioninitcore\settings_profil.php:22
actionshow_user_profilecore\settings_profil.php:25
actionedit_user_profilecore\settings_profil.php:26
actionpersonal_options_updatecore\settings_profil.php:29
actionedit_user_profile_updatecore\settings_profil.php:30
actionadmin_enqueue_scriptssms_partner.php:121
actionadmin_menusms_partner.php:130
Maintenance & Trust

SMS Partner Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedMar 18, 2025
PHP min version7.4
Downloads260

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

SMS Partner Developer Profile

SMS Partner

1 plugin · 0 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SMS Partner

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sms-partner/assets/a2f/style.css/wp-content/plugins/sms-partner/assets/a2f/script.js/wp-content/plugins/sms-partner/assets/css/intlTelInput-17.0.19.css/wp-content/plugins/sms-partner/assets/js/intlTelInput-17.0.19.min.js/wp-content/plugins/sms-partner/assets/js/custom-intl-tel-input.js/wp-content/plugins/sms-partner/assets/js/utils.js
Script Paths
assets/a2f/script.jsassets/js/intlTelInput-17.0.19.min.jsassets/js/custom-intl-tel-input.jsassets/js/utils.js
Version Parameters
sms-partner/assets/a2f/style.css?ver=1.0.0sms-partner/assets/a2f/script.js?ver=1.0.0sms-partner/assets/css/intlTelInput-17.0.19.css?ver=17.0.19sms-partner/assets/js/intlTelInput-17.0.19.min.js?ver=17.0.19sms-partner/assets/js/custom-intl-tel-input.js?ver=1.0.0

HTML / DOM Fingerprints

CSS Classes
intl-tel-inputiticountry-listselected-flag
Data Attributes
data-country
JS Globals
sms_partnera2f_data
REST Endpoints
/wp-json/sms-partner/v1/send-sms/wp-json/sms-partner/v1/verify-code
FAQ

Frequently Asked Questions about SMS Partner