Snow Storm Security & Risk Analysis

wordpress.org/plugins/snow-storm

Display falling snow flakes on the front of your WordPress website for a festive presentation.

500 active installs v1.4.7 PHP + WP 3.0+ Updated Mar 14, 2025
christmasfalling-snowfestivesnow-flakessnow-storm
91
A · Safe
CVEs total2
Unpatched0
Last CVEApr 2, 2025
Safety Verdict

Is Snow Storm Safe to Use in 2026?

Generally Safe

Score 91/100

Snow Storm has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Apr 2, 2025Updated 1yr ago
Risk Assessment

The "snow-storm" plugin v1.4.7 presents a mixed security posture. While it demonstrates some good practices such as using prepared statements for all SQL queries and having no dangerous functions or file operations, significant concerns arise from its attack surface and output sanitization. Two out of three AJAX handlers lack authentication checks, creating direct entry points for unauthenticated attackers. Furthermore, only 44% of output is properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities, which aligns with its vulnerability history. The plugin has a history of two medium-severity CVEs, both related to XSS, with the last one being recently disclosed. Although there are no currently unpatched CVEs, the past vulnerabilities and the static analysis findings suggest a pattern of insecure handling of user input, particularly in AJAX endpoints and output rendering.

While the plugin's lack of bundled libraries, external requests, and reliance on prepared SQL statements are positive security indicators, the unprotected AJAX endpoints and inadequate output escaping are critical weaknesses. The presence of unsanitized paths in taint analysis further reinforces the XSS risk. The plugin's overall security could be significantly improved by implementing robust authentication and authorization checks on all AJAX handlers and ensuring comprehensive output escaping across all rendering functions. The consistent history of XSS vulnerabilities, coupled with the current analysis, warrants caution.

Key Concerns

  • Unprotected AJAX handlers
  • Low percentage of properly escaped output
  • Flows with unsanitized paths in taint analysis
  • Medium severity CVEs in vulnerability history
Vulnerabilities
2

Snow Storm Security Vulnerabilities

CVEs by Year

2 CVEs in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-30858medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Snow Storm <= 1.4.6 - Reflected Cross-Site Scripting

Apr 2, 2025 Patched in 1.4.7 (8d)
WF-f5b21bbe-32d9-4054-99ff-8f272556eda9-snow-stormmedium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Snow Storm <= 1.4.6 - Authenticated (Administrator+) Stored Cross-Site Scripting

Mar 18, 2025 Patched in 1.4.7 (1d)
Code Analysis
Analyzed Mar 16, 2026

Snow Storm Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
12 escaped
Nonce Checks
2
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

44% escaped27 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
<snow-storm> (snow-storm.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Snow Storm Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 3

authwp_ajax_snowstorm_searchppsnow-storm.php:57
authwp_ajax_snow_storm_dismiss_smart_ratingsnow-storm.php:148
authwp_ajax_snowstorm_dismissed_noticesnow-storm.php:300
WordPress Hooks 8
actionplugins_loadedsnow-storm.php:291
actioninitsnow-storm.php:293
actionwp_headsnow-storm.php:294
actionadmin_menusnow-storm.php:295
actionwp_enqueue_scriptssnow-storm.php:296
actionadmin_print_scriptssnow-storm.php:297
actionadmin_noticessnow-storm.php:298
actionsnowstorm_ratereviewhooksnow-storm.php:299

Scheduled Events 3

snowstorm_ratereviewhook
snowstorm_ratereviewhook
snowstorm_ratereviewhook
Maintenance & Trust

Snow Storm Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedMar 14, 2025
PHP min version
Downloads113K

Community Trust

Rating92/100
Number of ratings49
Active installs500
Developer Profile

Snow Storm Developer Profile

Tribulant Software

7 plugins · 19K total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
803 days
View full developer profile
Detection Fingerprints

How We Detect Snow Storm

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/snow-storm/css/snow-storm.css/wp-content/plugins/snow-storm/js/snow-storm.js
Script Paths
/wp-content/plugins/snow-storm/js/postboxes.js/wp-content/plugins/snow-storm/js/snow-storm.js
Version Parameters
snow-storm/css/snow-storm.css?ver=snow-storm/js/postboxes.js?ver=snow-storm/js/snow-storm.js?ver=

HTML / DOM Fingerprints

CSS Classes
snow-storm-settings
Data Attributes
data-nonce
JS Globals
snowstorm
FAQ

Frequently Asked Questions about Snow Storm