SMS for WooCommerce Security & Risk Analysis

wordpress.org/plugins/wc-sms

Order SMS Notifications for Woocommerce

50 active installs v2.8.3 PHP 5.0+ WP 5.0+ Updated Dec 4, 2025
bulk-smsorder-notificationssmstwiliowoocommerce
99
A · Safe
CVEs total1
Unpatched0
Last CVEDec 16, 2024
Safety Verdict

Is SMS for WooCommerce Safe to Use in 2026?

Generally Safe

Score 99/100

SMS for WooCommerce has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Dec 16, 2024Updated 4mo ago
Risk Assessment

The 'wc-sms' plugin v2.8.3 presents a mixed security posture. On the positive side, it demonstrates good practices in handling SQL queries, with all 8 queries utilizing prepared statements, and it includes a nonce check. The attack surface is currently reported as zero for AJAX handlers, REST API routes, shortcodes, and cron events, indicating no readily discoverable public entry points without authentication. However, there are significant concerns that temper this positive outlook. The presence of the 'create_function' dangerous function is a notable red flag, as this function is deprecated and can be a vector for code injection if not handled with extreme care. Furthermore, a substantial 47% of output escaping is not properly handled, suggesting a risk of Cross-Site Scripting (XSS) vulnerabilities where user-controlled data might be rendered directly in the browser without sanitization. The taint analysis shows two flows with unsanitized paths, which, although not classified as critical or high severity in this report, warrant investigation and indicate potential data leakage or manipulation risks. The vulnerability history shows a single medium-severity CVE, which is currently patched, and the common vulnerability type being CSRF is a concern, though the absence of unpatched vulnerabilities is a positive sign. Overall, while the plugin avoids common pitfalls like raw SQL or unprotected AJAX endpoints, the use of dangerous functions and insufficient output escaping create potential security weaknesses that need to be addressed.

Key Concerns

  • Dangerous function used (create_function)
  • Significant unescaped output (47%)
  • Flows with unsanitized paths detected
  • Bundled library (Freemius) potentially outdated
Vulnerabilities
1

SMS for WooCommerce Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-12220medium · 6.1Cross-Site Request Forgery (CSRF)

SMS for WooCommerce <= 2.8.1 - Cross-Site Request Forgery to Reflected Cross-Site Scripting

Dec 16, 2024 Patched in 2.8.1.1 (1d)
Code Analysis
Analyzed Mar 16, 2026

SMS for WooCommerce Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
8 prepared
Unescaped Output
174
195 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
1

Dangerous Functions Found

create_function$callback = create_function('', _e(str_replace('"', '\"', $section['desc'])));includes\functions\class-wcsms-settings-functions.php:100

Bundled Libraries

Freemius1.0

SQL Query Safety

100% prepared8 total queries

Output Escaping

53% escaped369 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
<bulk-sms copy> (includes\admin\bulk-sms copy.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

SMS for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionadmin_initincludes\class-wcsms-settings.php:14
actionadmin_menuincludes\class-wcsms-settings.php:15
actionadmin_post_wcsms_send_bulk_smsincludes\class-wcsms-settings.php:16
actionwcsms_bulkemail_hookincludes\class-wcsms-sms.php:7
filteraction_scheduler_queue_runner_batch_sizeincludes\class-wcsms-sms.php:8
actionadmin_enqueue_scriptsincludes\functions\class-wcsms-settings-functions.php:21
actionadmin_noticesincludes\woo_notice.php:3
actionbefore_woocommerce_initwc-sms.php:116
actionplugins_loadedwc-sms.php:124
actioninitwc-sms.php:127
Maintenance & Trust

SMS for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedDec 4, 2025
PHP min version5.0
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs50
Developer Profile

SMS for WooCommerce Developer Profile

The African Boss

6 plugins · 8K total installs

81
trust score
Avg Security Score
90/100
Avg Patch Time
66 days
View full developer profile
Detection Fingerprints

How We Detect SMS for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wc-sms/assets/js/admin.js/wp-content/plugins/wc-sms/assets/css/jquery.modal.min.css
Script Paths
/wp-content/plugins/wc-sms/assets/js/admin.js/wp-content/plugins/wc-sms/assets/js/jquery.modal.min.js

HTML / DOM Fingerprints

Data Attributes
data-freemius-product-id="9965"data-freemius-slug="wc-sms"data-freemius-premium-slug="wc-sms-pro"
JS Globals
wcsms_fs
FAQ

Frequently Asked Questions about SMS for WooCommerce