
Useinfluence Security & Risk Analysis
wordpress.org/plugins/useinfluenceUseInfluence uses 'Social Proof Notifications' to give a conversion BOOST to your website's traffic. Our realtime notifications puts a …
Is Useinfluence Safe to Use in 2026?
Use With Caution
Score 64/100Useinfluence has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The 'useinfluence' plugin version 1.0.8 presents a mixed security posture. On the positive side, the plugin demonstrates good practices by exclusively using prepared statements for its SQL queries and avoiding dangerous functions and file operations. The static analysis reveals a seemingly small attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, no unprotected entry points were identified.
However, significant concerns arise from the output escaping and taint analysis. A substantial portion of output (62%) is not properly escaped, creating a strong potential for Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis indicates two flows with unsanitized paths, which, although not classified as critical or high severity in this analysis, represent potential vulnerabilities that could be exploited if proper sanitization is not applied. The vulnerability history also raises a red flag, with one unpatched medium severity CVE, which is concerning given the plugin's current version and the lack of recent updates to address it.
In conclusion, while the plugin benefits from secure database interaction and a limited attack surface, the prevalent issue with output escaping and the presence of an unpatched vulnerability necessitate careful consideration. The lack of nonce checks and capability checks on entry points, though currently not directly exploitable due to the absence of unprotected entry points, could become a concern if the attack surface expands in future versions. Addressing the output escaping and the existing CVE is paramount for improving the plugin's security.
Key Concerns
- Unpatched CVE (Medium severity)
- Insufficient output escaping (38% properly escaped)
- Taint flows with unsanitized paths (2 flows)
- No nonce checks
- No capability checks
Useinfluence Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Useinfluence <= 1.0.8 - Cross-Site Request Forgery
Useinfluence Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Useinfluence Attack Surface
WordPress Hooks 8
Maintenance & Trust
Useinfluence Maintenance & Trust
Maintenance Signals
Community Trust
Useinfluence Alternatives
Proof Factor – Social Proof Notifications for WooCommerce
proof-factor-social-proof-notifications-for-woocommerce
Proof Factor displays recent orders and purchases on your WooCommerce storefront!
WebToffee eCommerce Marketing Automation – Email marketing, Popups, Email customizer
decorator-woocommerce-email-customizer
Create and send marketing emails and campaigns. Enable email automations, Popups, spin-a-wheel, sign-up forms, and more. Customize WooCommerce emails.
ShopMagic – Twilio SMS
shopmagic-for-twilio
Send WooCommerce SMS notifications, reminders, and text messages to your customers. The plugin is the ShopMagic add-on and it lets you send sms remind …
Proof Factor – Social Proof Notifications
proof-factor-social-proof-notifications
Proof Factor displays recent user sign ups!
WP Live Social-Proof
wp-real-time-social-proof
The best animated, live, social-proof plugin for WooCommerce, Easy Digital Downloads or webinars and subscriptions to compel buyer action.
Useinfluence Developer Profile
1 plugin · 50 total installs
How We Detect Useinfluence
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/useinfluence/assets/logo-influence-2.a5936714.pngHTML / DOM Fingerprints
describeid="trackingId"id="campaign_id"id="app_key"