WebJunk PHPList Security & Risk Analysis

wordpress.org/plugins/webjunk-phplist

WebJunk PHPList is a Wordpress plugin that integrates a Seperate PHPList install with Wordpress.

10 active installs v1.2.0 PHP + WP 2.1.7+ Updated Nov 5, 2010
email-managementmailingmailing-listphplist
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WebJunk PHPList Safe to Use in 2026?

Generally Safe

Score 85/100

WebJunk PHPList has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The webjunk-phplist plugin, in version 1.2.0, exhibits a mixed security posture. On the positive side, there are no recorded vulnerabilities (CVEs) to date, and the static analysis shows a relatively small attack surface with no immediately apparent unprotected entry points like AJAX handlers, REST API routes, or shortcodes. Additionally, the plugin uses prepared statements for a majority of its SQL queries and performs capability checks, indicating some awareness of secure coding practices.

However, significant concerns arise from the output escaping and taint analysis. A concerning 100% of the identified output points are not properly escaped, creating a high risk of cross-site scripting (XSS) vulnerabilities. Furthermore, the taint analysis revealed three flows with unsanitized paths. While these are not categorized as critical or high severity, unsanitized paths are a direct indicator of potential injection vulnerabilities, especially when combined with the lack of proper output escaping. The absence of nonce checks, even with a minimal attack surface, is another potential weakness. The plugin's history of no vulnerabilities is positive but can be misleading if underlying weaknesses like unescaped output and unsanitized paths persist. A future vulnerability could easily exploit these gaps.

In conclusion, while the plugin demonstrates strengths in its minimal attack surface and some use of prepared statements and capability checks, the critical flaw of unescaped output coupled with unsanitized path flows presents a substantial risk. The lack of nonce checks further amplifies these concerns. Without addressing these critical coding weaknesses, the plugin's perfect vulnerability history is fragile and could easily be broken by an attacker.

Key Concerns

  • All output not properly escaped
  • Flows with unsanitized paths
  • No nonce checks
  • Low SQL prepared statement usage (33%)
Vulnerabilities
None known

WebJunk PHPList Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WebJunk PHPList Release Timeline

v1.0.1
v0.2.0
Code Analysis
Analyzed Mar 16, 2026

WebJunk PHPList Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
2 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
5
External Requests
1
Bundled Libraries
0

SQL Query Safety

67% prepared3 total queries

Output Escaping

0% escaped9 total outputs
Data Flows · Security
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
wj_mail_add_admin (wjphplist_cp.php:6)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WebJunk PHPList Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitwjphplist.php:86
filterwp_footerwjphplist.php:87
filterthe_contentwjphplist.php:88
actionwp_headwjphplist.php:89
actionwj_mail_cron_hookwjphplist.php:510
actionadmin_menuwjphplist_cp.php:145

Scheduled Events 1

wj_mail_cron_hook
Maintenance & Trust

WebJunk PHPList Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedNov 5, 2010
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WebJunk PHPList Developer Profile

webjunk

3 plugins · 90 total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WebJunk PHPList

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/webjunk-phplist/css/style.css/wp-content/plugins/webjunk-phplist/js/script.js
Script Paths
/wp-content/plugins/webjunk-phplist/js/script.js
Version Parameters
webjunk-phplist/css/style.css?ver=webjunk-phplist/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
wjphplist-subscribe-form
HTML Comments
<!-- webjunk-phplist starts --><!-- webjunk-phplist ends -->
Data Attributes
data-wjphplist-action
JS Globals
window.wj_phplist_configvar wj_phplist_config
Shortcode Output
[webjunk_phplist_subscribe_form][webjunk_phplist_display_archive]
FAQ

Frequently Asked Questions about WebJunk PHPList