Subscribe to Comments Security & Risk Analysis

wordpress.org/plugins/subscribe-to-comments

Subscribe to Comments allows commenters on an entry to subscribe to e-mail notifications for subsequent comments.

20K active installs v2.3.1 PHP + WP 2.9+ Updated Oct 29, 2024
commentsemailsubscription
89
A · Safe
CVEs total3
Unpatched0
Last CVEOct 29, 2024
Safety Verdict

Is Subscribe to Comments Safe to Use in 2026?

Generally Safe

Score 89/100

Subscribe to Comments has a strong security track record. Known vulnerabilities have been patched promptly.

3 known CVEsLast CVE: Oct 29, 2024Updated 1yr ago
Risk Assessment

The "subscribe-to-comments" plugin version 2.3.1 exhibits a mixed security posture. On the positive side, it demonstrates a relatively small attack surface with no apparent direct entry points like AJAX handlers, REST API routes, or shortcodes exposed without authentication. The code also shows a good use of prepared statements for SQL queries (82%) and includes some nonce and capability checks, indicating an awareness of common WordPress security practices. However, significant concerns arise from the static analysis results. A notable percentage of output (49%) is not properly escaped, creating a potential for Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis revealed flows with unsanitized paths and a high severity flow, which, while not explicitly defined as a vulnerability in this version, suggests potential for insecure file handling or other input-related risks. The plugin's vulnerability history is a significant red flag, with three past CVEs, including one high and two medium severity issues, specifically related to Remote File Inclusion and Cross-Site Scripting. The fact that the last vulnerability was quite recent (October 2024) and involved these critical types of attacks, even if currently unpatched for this specific version, points to recurring security weaknesses within the plugin's codebase. While the absence of unpatched CVEs for version 2.3.1 is positive, the historical pattern and the identified code signals suggest a need for vigilance and further investigation into the actual exploitative potential of the unsanitized paths and unescaped outputs.

Key Concerns

  • Unescaped output identified
  • Taint flow with unsanitized path
  • Taint flow with high severity
  • Previous High severity CVEs
  • Previous Medium severity CVEs
Vulnerabilities
3

Subscribe to Comments Security Vulnerabilities

CVEs by Year

1 CVE in 2006
2006
1 CVE in 2015
2015
1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

High
1
Medium
2

3 total CVEs

CVE-2024-8792medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Subscribe to Comments <= 2.3 - Reflected Cross-Site Scripting

Oct 29, 2024 Patched in 2.3.1 (1d)
CVE-2015-10133high · 7.2Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')

Subscribe to Comments <= 2.1.2 - Local File Includion

Jul 15, 2015 Patched in 2.3 (3657d)
CVE-2006-10001medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Subscribe to Comments <= 2.0.7 - Reflected Cross-Site Scripting

Sep 17, 2006 Patched in 2.0.8 (6353d)
Code Analysis
Analyzed Mar 16, 2026

Subscribe to Comments Code Analysis

Dangerous Functions
0
Raw SQL Queries
7
31 prepared
Unescaped Output
32
33 escaped
Nonce Checks
1
Capability Checks
6
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

82% prepared38 total queries

Output Escaping

51% escaped65 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
show_manual_subscription_form (subscribe-to-comments.php:42)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Subscribe to Comments Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
actioncomment_formsubscribe-to-comments.php:167
filtercomment_form_defaultssubscribe-to-comments.php:169
actioncomment_postsubscribe-to-comments.php:172
actioncomment_postsubscribe-to-comments.php:173
actionwp_set_comment_statussubscribe-to-comments.php:174
actionadmin_menusubscribe-to-comments.php:175
actionadmin_headsubscribe-to-comments.php:176
actionedit_commentsubscribe-to-comments.php:177
actiondelete_commentsubscribe-to-comments.php:178
filterthe_contentsubscribe-to-comments.php:179
filterget_comment_author_linksubscribe-to-comments.php:181
filterpreprocess_commentsubscribe-to-comments.php:184
actioninitsubscribe-to-comments.php:187
actiontemplate_redirectsubscribe-to-comments.php:190
actionwp_titlesubscribe-to-comments.php:243
actionwp_headsubscribe-to-comments.php:244
Maintenance & Trust

Subscribe to Comments Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedOct 29, 2024
PHP min version
Downloads572K

Community Trust

Rating78/100
Number of ratings14
Active installs20K
Developer Profile

Subscribe to Comments Developer Profile

Mark Jaquith

29 plugins · 176K total installs

69
trust score
Avg Security Score
86/100
Avg Patch Time
3337 days
View full developer profile
Detection Fingerprints

How We Detect Subscribe to Comments

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/subscribe-to-comments/js/subscribe-to-comments.js/wp-content/plugins/subscribe-to-comments/css/style.css
Script Paths
/wp-content/plugins/subscribe-to-comments/js/subscribe-to-comments.js
Version Parameters
subscribe-to-comments/style.css?ver=subscribe-to-comments/js/subscribe-to-comments.js?ver=

HTML / DOM Fingerprints

CSS Classes
solo-subscribe-to-commentssolo-subscribe-email
Data Attributes
name="solo-comment-subscribe"name="postid"name="ref"id="solo-subscribe-email"
JS Globals
sg_subscribe_stc
FAQ

Frequently Asked Questions about Subscribe to Comments