Subscriber Boost for MailChimp Security & Risk Analysis

wordpress.org/plugins/subscriber-boost-for-mailchimp

Subscriber Boost for Mailchimp is a super simple newsletter subscription plugin that helps boost your audience numbers with a beautiful design that wo …

0 active installs v0.1 PHP + WP 4.0+ Updated May 29, 2018
gdprmailchimpnewslettersubscribesubscription
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Subscriber Boost for MailChimp Safe to Use in 2026?

Generally Safe

Score 85/100

Subscriber Boost for MailChimp has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "subscriber-boost-for-mailchimp" plugin, version 0.1, presents a seemingly secure initial posture based on the static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points is a significant strength, minimizing the direct attack surface. Furthermore, the complete use of prepared statements for SQL queries and the absence of dangerous functions and file operations suggest a commitment to secure coding practices in these critical areas. However, the static analysis also reveals areas for concern. A notable weakness is the lack of nonce checks and capability checks, which are fundamental for securing user actions and preventing unauthorized access. Additionally, with 34 output operations, only 62% being properly escaped leaves a significant portion potentially vulnerable to cross-site scripting (XSS) attacks. The presence of external HTTP requests, while not inherently bad, can introduce risks if not handled securely, especially when interacting with third-party services. The complete lack of taint analysis results is unusual and could indicate either a very limited codebase or that the analysis tool was not effectively configured for this plugin, thus obscuring potential vulnerabilities. The plugin's vulnerability history is remarkably clean, with zero recorded CVEs. This is a positive indicator, suggesting the plugin has either been well-maintained or hasn't been a target for in-depth security research. However, it's important to remember that this is version 0.1, and a lack of past vulnerabilities does not guarantee future security, especially given the identified weaknesses in the current code analysis.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Significant portion of output not escaped
  • External HTTP requests present
  • No taint analysis results
Vulnerabilities
None known

Subscriber Boost for MailChimp Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Subscriber Boost for MailChimp Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
13
21 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

Output Escaping

62% escaped34 total outputs
Attack Surface

Subscriber Boost for MailChimp Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_menuSubscriberBoostBackend.php:33
actionadmin_initSubscriberBoostBackend.php:37
actiontoplevel_page_subscriber-boost-for-mailchimpSubscriberBoostBackend.php:40
actiontoplevel_page_subscriber-boost-for-mailchimpSubscriberBoostBackend.php:41
actionrest_api_initSubscriberBoostFrontend.php:12
actionwp_enqueue_scriptsSubscriberBoostFrontend.php:15
actionwp_footerSubscriberBoostFrontend.php:18
actionwp_footerSubscriberBoostFrontend.php:21
Maintenance & Trust

Subscriber Boost for MailChimp Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMay 29, 2018
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Subscriber Boost for MailChimp Developer Profile

convertwise

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Subscriber Boost for MailChimp

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/subscriber-boost-for-mailchimp/assets/js/settings.js/wp-content/plugins/subscriber-boost-for-mailchimp/assets/css/settings.css
Script Paths
/wp-content/plugins/subscriber-boost-for-mailchimp/assets/js/settings.js
Version Parameters
subscriber-boost-for-mailchimp/assets/js/settings.js?ver=1.0.0subscriber-boost-for-mailchimp/assets/css/settings.css?ver=

HTML / DOM Fingerprints

CSS Classes
statisticsstatistics__blockstatistics__block-figuresstatistics__block-titlestatistics__block-subtitle
REST Endpoints
/wp-json/mailchimp/v1/lists
FAQ

Frequently Asked Questions about Subscriber Boost for MailChimp