VoyageSMS Security & Risk Analysis

wordpress.org/plugins/voyagesms

This is a plugin for existing VoyageSMS clients on WooCommerce to add required scripts for modal display and purchase tracking.

0 active installs v1.1 PHP 5.2.4+ WP 2.7+ Updated Jan 18, 2020
sms-marketingvoyage-smsvoyagesms
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is VoyageSMS Safe to Use in 2026?

Generally Safe

Score 85/100

VoyageSMS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The VoyagesMS v1.1 plugin exhibits a strong security posture concerning its attack surface and vulnerability history. The absence of AJAX handlers, REST API routes, shortcodes, and cron events, coupled with zero known CVEs and no recorded vulnerabilities, suggests diligent security practices in development and maintenance. The code also demonstrates good practices by using prepared statements for all SQL queries and avoiding file operations and external HTTP requests. However, a significant concern arises from the complete lack of output escaping. With 5 total outputs and 0% properly escaped, this indicates a high potential for cross-site scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the user interface. The absence of nonce checks and capability checks on entry points, while currently not an issue due to the lack of exposed entry points, could become a risk if future versions introduce new features without proper authentication and authorization measures. In conclusion, while the plugin is currently robust due to its limited attack surface and clean history, the critical lack of output escaping represents a notable weakness that should be addressed immediately to prevent potential XSS attacks.

Key Concerns

  • No output escaping on any outputs
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

VoyageSMS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

VoyageSMS Release Timeline

v1.1Current
v1.0
Code Analysis
Analyzed Apr 16, 2026

VoyageSMS Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

VoyageSMS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_headvoyagesms.php:12
actionwoocommerce_thankyouvoyagesms.php:13
actionadmin_menuvoyagesms.php:15
actionadmin_menuvoyagesms.php:16
actionadmin_initvoyagesms.php:17
Maintenance & Trust

VoyageSMS Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedJan 18, 2020
PHP min version5.2.4
Downloads972

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

VoyageSMS Developer Profile

Nurul Huda (Apon)

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect VoyageSMS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
window.voyage
FAQ

Frequently Asked Questions about VoyageSMS