Useinfluence Security & Risk Analysis

wordpress.org/plugins/useinfluence

UseInfluence uses 'Social Proof Notifications' to give a conversion BOOST to your website's traffic. Our realtime notifications puts a …

50 active installs v1.0.8 PHP 5.2+ WP 3.1.0+ Updated May 20, 2020
marketingnotificationspopupssocial-proofwoocommerce
64
C · Use Caution
CVEs total1
Unpatched1
Last CVEMar 31, 2025
Safety Verdict

Is Useinfluence Safe to Use in 2026?

Use With Caution

Score 64/100

Useinfluence has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Mar 31, 2025Updated 5yr ago
Risk Assessment

The 'useinfluence' plugin version 1.0.8 presents a mixed security posture. On the positive side, the plugin demonstrates good practices by exclusively using prepared statements for its SQL queries and avoiding dangerous functions and file operations. The static analysis reveals a seemingly small attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, no unprotected entry points were identified.

However, significant concerns arise from the output escaping and taint analysis. A substantial portion of output (62%) is not properly escaped, creating a strong potential for Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis indicates two flows with unsanitized paths, which, although not classified as critical or high severity in this analysis, represent potential vulnerabilities that could be exploited if proper sanitization is not applied. The vulnerability history also raises a red flag, with one unpatched medium severity CVE, which is concerning given the plugin's current version and the lack of recent updates to address it.

In conclusion, while the plugin benefits from secure database interaction and a limited attack surface, the prevalent issue with output escaping and the presence of an unpatched vulnerability necessitate careful consideration. The lack of nonce checks and capability checks on entry points, though currently not directly exploitable due to the absence of unprotected entry points, could become a concern if the attack surface expands in future versions. Addressing the output escaping and the existing CVE is paramount for improving the plugin's security.

Key Concerns

  • Unpatched CVE (Medium severity)
  • Insufficient output escaping (38% properly escaped)
  • Taint flows with unsanitized paths (2 flows)
  • No nonce checks
  • No capability checks
Vulnerabilities
1

Useinfluence Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-31625medium · 4.3Cross-Site Request Forgery (CSRF)

Useinfluence <= 1.0.8 - Cross-Site Request Forgery

Mar 31, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Useinfluence Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
5
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

38% escaped8 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
influence_screen (useinfluence.php:111)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Useinfluence Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionplugins_loadedincludes\class-useinfluence.php:142
actionadmin_enqueue_scriptsincludes\class-useinfluence.php:157
actionadmin_enqueue_scriptsincludes\class-useinfluence.php:158
actionwp_enqueue_scriptsincludes\class-useinfluence.php:173
actionwp_enqueue_scriptsincludes\class-useinfluence.php:174
actionwoocommerce_checkout_order_processedincludes\useinfluence_send_wooco_data.php:43
actionadmin_menuuseinfluence.php:91
actionwp_headuseinfluence.php:206
Maintenance & Trust

Useinfluence Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedMay 20, 2020
PHP min version5.2
Downloads5K

Community Trust

Rating60/100
Number of ratings6
Active installs50
Developer Profile

Useinfluence Developer Profile

ramanparashar

1 plugin · 50 total installs

69
trust score
Avg Security Score
64/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Useinfluence

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/useinfluence/assets/logo-influence-2.a5936714.png

HTML / DOM Fingerprints

CSS Classes
describe
Data Attributes
id="trackingId"id="campaign_id"id="app_key"
FAQ

Frequently Asked Questions about Useinfluence