Toll Free SMS Security & Risk Analysis

wordpress.org/plugins/toll-free-sms

A wordpress plugin that lets you send Free SMS to your subscribers using your Way2SMS account without leaving wordpress admin area.

10 active installs v1.0 PHP + WP 3.0+ Updated Sep 30, 2012
free-smssmstoll-free-smstoll-freeway2sms
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Toll Free SMS Safe to Use in 2026?

Generally Safe

Score 85/100

Toll Free SMS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "toll-free-sms" plugin version 1.0 presents a mixed security posture. On one hand, the static analysis indicates a small attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. The absence of dangerous functions and a lack of any recorded historical vulnerabilities are positive indicators. Furthermore, all SQL queries are correctly using prepared statements, and taint analysis reveals no critical or high severity issues.

However, significant concerns arise from the output escaping and capability checks. A concerning 0% of outputs are properly escaped, meaning any data displayed to users could potentially be manipulated, leading to cross-site scripting (XSS) vulnerabilities. The complete absence of nonce checks and capability checks on entry points, despite the small reported attack surface, is a critical oversight. This lack of authorization and integrity checks means that even if no direct vulnerabilities are immediately apparent, attackers could leverage the plugin's functionality in unexpected ways or trigger actions without proper user authentication.

While the plugin's history is clean and it avoids common pitfalls like raw SQL or bundled outdated libraries, the fundamental lack of output escaping and authorization is a major weakness. The plugin is strong in its avoidance of known attack vectors and SQL injection, but it leaves itself wide open to XSS and unauthorized actions due to incomplete input validation and output sanitization. This makes the plugin a potentially risky component despite its clean history and limited apparent attack surface.

Key Concerns

  • Outputs not properly escaped
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Toll Free SMS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Toll Free SMS Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
2
Bundled Libraries
0

Output Escaping

0% escaped9 total outputs
Attack Surface

Toll Free SMS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_inittoll-free-sms.php:306
actionadmin_menutoll-free-sms.php:307
Maintenance & Trust

Toll Free SMS Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedSep 30, 2012
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Toll Free SMS Developer Profile

Nitin Yawalkar

4 plugins · 740 total installs

80
trust score
Avg Security Score
80/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Toll Free SMS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/toll-free-sms/sms.png/wp-content/plugins/toll-free-sms/loading.gif/wp-content/plugins/toll-free-sms/images/btn_donate.gif/wp-content/plugins/toll-free-sms/sms32.png

HTML / DOM Fingerprints

CSS Classes
lblerror
Data Attributes
id="mobile"id="mobile1"id="user"id="status"id="smsform"id="sendsms"+10 more
JS Globals
window.jQuery
FAQ

Frequently Asked Questions about Toll Free SMS