Squeeze Page Toolkit for WordPress Security & Risk Analysis

wordpress.org/plugins/squeeze-page-toolkit

The official Squeeze Page Toolkit plugin that connects your account for hosting your squeeze pages and landing pages on your WordPress website.

20 active installs v1.20 PHP + WP 5.0+ Updated Dec 17, 2020
landing-pagesopt-in-boxessqueeze-page-toolkitsqueeze-pages
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Squeeze Page Toolkit for WordPress Safe to Use in 2026?

Generally Safe

Score 85/100

Squeeze Page Toolkit for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The 'squeeze-page-toolkit' plugin v1.20 presents a mixed security posture. While the static analysis indicates a commendable lack of direct attack surface through AJAX, REST API, shortcodes, or cron events, and crucially, no recorded vulnerabilities or CVEs, significant concerns arise from the code analysis. The presence of dangerous functions like `create_function` and `unserialize`, coupled with a very low rate of properly escaped output (only 6%), indicates a high risk of potential cross-site scripting (XSS) or remote code execution (RCE) vulnerabilities, especially if any of the input streams were to become exposed or manipulated.

The taint analysis revealing two flows with unsanitized paths, even without critical or high severity, suggests potential pathways for malicious data to be processed without adequate validation or sanitization. The complete absence of nonce and capability checks on any entry points, combined with the use of `unserialize`, makes it highly probable that attackers could inject malicious code or alter plugin behavior by crafting specific inputs. This is further exacerbated by the fact that 50% of SQL queries are not using prepared statements, increasing the risk of SQL injection.

Despite a clean vulnerability history, which is a positive sign, the identified code signals and taint flows represent significant inherent risks. The plugin needs substantial security improvements in data handling, output sanitization, and the implementation of authentication and authorization checks to mitigate these potential vulnerabilities. The lack of historical issues should not breed complacency given the evident weaknesses in the current code.

Key Concerns

  • Dangerous function: unserialize
  • Dangerous function: create_function
  • Unsanitized paths in taint analysis
  • Low output escaping rate (6%)
  • No nonce checks
  • No capability checks
  • SQL queries not using prepared statements (50%)
Vulnerabilities
None known

Squeeze Page Toolkit for WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Squeeze Page Toolkit for WordPress Release Timeline

v1.20Current
v1.19
v1.16
v1.15
v1.14
v1.13
v1.12
v1.11
v1.10
Code Analysis
Analyzed Mar 16, 2026

Squeeze Page Toolkit for WordPress Code Analysis

Dangerous Functions
2
Raw SQL Queries
2
2 prepared
Unescaped Output
16
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_function$filterFunc = create_function('$v', '$filterStr = "'.$this->name.'_"; return (substr($v, 0, strlen($wplib\utils_formbuilder.inc.php:2067
unserializereturn unserialize($rawSettings);wplib\utils_settings.inc.php:135

SQL Query Safety

50% prepared4 total queries

Output Escaping

6% escaped17 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
showSettingsTabs (wplib\utils_pagebuilder.inc.php:105)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Squeeze Page Toolkit for WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
actionadmin_menusqueeze-page-toolkit.php:66
actionadmin_print_stylessqueeze-page-toolkit.php:69
actionadd_meta_boxessqueeze-page-toolkit.php:72
actionsave_postsqueeze-page-toolkit.php:73
actionadd_meta_boxessqueeze-page-toolkit.php:76
filterplugin_action_linkssqueeze-page-toolkit.php:79
actionadmin_noticessqueeze-page-toolkit.php:82
actiongenerate_rewrite_rulessqueeze-page-toolkit.php:83
actionadmin_bar_menusqueeze-page-toolkit.php:86
actiontemplate_redirectsqueeze-page-toolkit.php:98
filterquery_varssqueeze-page-toolkit.php:105
actionpre_get_postssqueeze-page-toolkit.php:114
filterpost_type_linksqueeze-page-toolkit.php:115
actioninitsqueeze-page-toolkit.php:119
Maintenance & Trust

Squeeze Page Toolkit for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedDec 17, 2020
PHP min version
Downloads11K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Squeeze Page Toolkit for WordPress Developer Profile

Dan Harrison

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Squeeze Page Toolkit for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/squeeze-page-toolkit/wplib/utils_settings.inc.php/wp-content/plugins/squeeze-page-toolkit/wplib/utils_pagebuilder.inc.php/wp-content/plugins/squeeze-page-toolkit/lib/common.inc.php/wp-content/plugins/squeeze-page-toolkit/lib/admin_only.inc.php/wp-content/plugins/squeeze-page-toolkit/lib/db.inc.php

HTML / DOM Fingerprints

CSS Classes
sptk_for_wp_adminbar
Data Attributes
data-sptk-page-id
JS Globals
sptk_vars
REST Endpoints
/wp-json/sptk/v1/pages/wp-json/sptk/v1/settings
Shortcode Output
[sptk_page id=""]
FAQ

Frequently Asked Questions about Squeeze Page Toolkit for WordPress