
Velstack SMS For WooCommerce Security & Risk Analysis
wordpress.org/plugins/velstack-sms-for-woocommerceVelstack SMS For WooCommerce enables automatic SMS notifications for order updates.
Is Velstack SMS For WooCommerce Safe to Use in 2026?
Generally Safe
Score 92/100Velstack SMS For WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
Based on the static analysis and vulnerability history, the "velstack-sms-for-woocommerce" plugin v1.0 presents a seemingly strong security posture with no identified vulnerabilities in its history and good coding practices within the static analysis. The absence of critical or high-severity taint flows, along with the proper use of prepared statements for SQL queries and output escaping, indicates a conscious effort to prevent common web vulnerabilities. The plugin also has a remarkably small attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events that would typically serve as entry points for attackers.
However, the analysis does flag a single external HTTP request, which, without further context on its purpose and implementation (e.g., whether it uses SSL/TLS, if the target is trustworthy, and if any data sent is sanitized), represents a potential, albeit isolated, risk. Furthermore, the complete lack of nonce checks and capability checks across all potential entry points (even if there are none listed) is a significant concern. While the current attack surface is zero, any future addition of AJAX, REST API endpoints, or other interactive features without these fundamental WordPress security mechanisms in place would immediately introduce critical vulnerabilities. The plugin's vulnerability history being entirely clear is a positive indicator, suggesting the developers have maintained a secure codebase, but it doesn't mitigate the absence of crucial security checks for future development.
In conclusion, the plugin demonstrates good practices in specific areas like SQL and output handling, and its current attack surface is zero, contributing to its apparent security. The primary weakness lies in the complete absence of built-in security checks like nonces and capability checks, which, if not addressed in future updates or if the attack surface expands, could lead to significant security issues. The external HTTP request also warrants careful review.
Key Concerns
- External HTTP request without context
- Missing nonce checks
- Missing capability checks
Velstack SMS For WooCommerce Security Vulnerabilities
Velstack SMS For WooCommerce Code Analysis
Velstack SMS For WooCommerce Attack Surface
WordPress Hooks 5
Maintenance & Trust
Velstack SMS For WooCommerce Maintenance & Trust
Maintenance Signals
Community Trust
Velstack SMS For WooCommerce Alternatives
E-goi SMS Orders Alert/Notifications
sms-orders-alertnotifications-for-woocommerce
SMS Order Alerts for WooCommerce: Increase conversions by sending status, shipping, and Multibanco/PagSeguro payment reminders via SMS.
SMS8.io
sms8-io
FREE SMS 8 plugin is a WordPress plugin that allows you to send SMS notifications to your customers instantly when they place an order on your WooComm …
WSMS (formerly WP SMS) – SMS & MMS Notifications with OTP and 2FA for WooCommerce
wp-sms
Send SMS/MMS notifications, OTP & 2FA messages, and WooCommerce updates with support for multiple gateways and plugin integrations.
NotifSMS – SMS Notifications OTP & 2FA for WordPress & WooCommerce
wp-twilio-core
Send SMS, OTP & 2FA notifications from WordPress via Twilio. Includes automated alerts, bulk messaging, and integrations with popular plugins.
ShopMagic – Twilio SMS
shopmagic-for-twilio
Send WooCommerce SMS notifications, reminders, and text messages to your customers. The plugin is the ShopMagic add-on and it lets you send sms remind …
Velstack SMS For WooCommerce Developer Profile
1 plugin · 0 total installs
How We Detect Velstack SMS For WooCommerce
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
notice-error