
WEB2SMS Security & Risk Analysis
wordpress.org/plugins/web-2-smsSend SMS via web2sms.ro on order status change & abandoned carts.
Is WEB2SMS Safe to Use in 2026?
Generally Safe
Score 85/100WEB2SMS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The web-2-sms plugin v1.0.0 exhibits a strong security posture based on the static analysis. A significant strength is the complete absence of dangerous functions, external HTTP requests, and file operations, which are common vectors for vulnerabilities. Furthermore, all SQL queries are properly prepared, and all output is correctly escaped, mitigating risks of SQL injection and XSS attacks respectively. The presence of nonce and capability checks on the identified entry points is also commendable.
Despite these positive findings, the static analysis did not reveal any taint flows, which means that potential vulnerabilities where user input could be used unsafely in sensitive operations were not detected. While this is a positive sign, it's important to note that taint analysis is not exhaustive and complex vulnerabilities might be missed. The vulnerability history is clean, with no known CVEs, indicating a history of relatively secure development or a lack of prior extensive security auditing. However, the absence of past vulnerabilities does not guarantee future security.
In conclusion, the plugin appears to be developed with good security practices in mind, demonstrating a low risk profile based on the provided data. The complete reliance on prepared statements and proper output escaping, along with checks on entry points, are significant strengths. The lack of any detected critical or high-severity issues in the static analysis and the absence of historical vulnerabilities further bolster this assessment. The only minor area of caution would be the reliance on the assumption that taint analysis was comprehensive, but given the overall positive indicators, the current risk is assessed as low.
WEB2SMS Security Vulnerabilities
WEB2SMS Code Analysis
SQL Query Safety
Output Escaping
WEB2SMS Attack Surface
AJAX Handlers 1
WordPress Hooks 15
Scheduled Events 1
Maintenance & Trust
WEB2SMS Maintenance & Trust
Maintenance Signals
Community Trust
WEB2SMS Developer Profile
2 plugins · 10K total installs
How We Detect WEB2SMS
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/web-2-sms/css/web2sms.css/wp-content/plugins/web-2-sms/css/toastr.min.css/wp-content/plugins/web-2-sms/js/toastr.min.js/wp-content/plugins/web-2-sms/js/web2sms.js/wp-content/plugins/web-2-sms/js/toastr.min.js/wp-content/plugins/web-2-sms/js/web2sms.jsweb-2-sms/css/web2sms.css?ver=web-2-sms/css/toastr.min.css?ver=web-2-sms/js/toastr.min.js?ver=web-2-sms/js/web2sms.js?ver=HTML / DOM Fingerprints
woocommerce_settings_tab_web2smsid="show_documention"web2sms_data