
WebJunk PHPList Security & Risk Analysis
wordpress.org/plugins/webjunk-phplistWebJunk PHPList is a Wordpress plugin that integrates a Seperate PHPList install with Wordpress.
Is WebJunk PHPList Safe to Use in 2026?
Generally Safe
Score 85/100WebJunk PHPList has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The webjunk-phplist plugin, in version 1.2.0, exhibits a mixed security posture. On the positive side, there are no recorded vulnerabilities (CVEs) to date, and the static analysis shows a relatively small attack surface with no immediately apparent unprotected entry points like AJAX handlers, REST API routes, or shortcodes. Additionally, the plugin uses prepared statements for a majority of its SQL queries and performs capability checks, indicating some awareness of secure coding practices.
However, significant concerns arise from the output escaping and taint analysis. A concerning 100% of the identified output points are not properly escaped, creating a high risk of cross-site scripting (XSS) vulnerabilities. Furthermore, the taint analysis revealed three flows with unsanitized paths. While these are not categorized as critical or high severity, unsanitized paths are a direct indicator of potential injection vulnerabilities, especially when combined with the lack of proper output escaping. The absence of nonce checks, even with a minimal attack surface, is another potential weakness. The plugin's history of no vulnerabilities is positive but can be misleading if underlying weaknesses like unescaped output and unsanitized paths persist. A future vulnerability could easily exploit these gaps.
In conclusion, while the plugin demonstrates strengths in its minimal attack surface and some use of prepared statements and capability checks, the critical flaw of unescaped output coupled with unsanitized path flows presents a substantial risk. The lack of nonce checks further amplifies these concerns. Without addressing these critical coding weaknesses, the plugin's perfect vulnerability history is fragile and could easily be broken by an attacker.
Key Concerns
- All output not properly escaped
- Flows with unsanitized paths
- No nonce checks
- Low SQL prepared statement usage (33%)
WebJunk PHPList Security Vulnerabilities
WebJunk PHPList Release Timeline
WebJunk PHPList Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
WebJunk PHPList Attack Surface
WordPress Hooks 6
Scheduled Events 1
Maintenance & Trust
WebJunk PHPList Maintenance & Trust
Maintenance Signals
Community Trust
WebJunk PHPList Alternatives
Participants Database
participants-database
Build and maintain a fully customizable database of participants, members or anything with signup forms, admin backend, custom lists, and CSV support.
Newsletters
newsletters-lite
Newsletter plugin for WordPress to capture subscribers and send beautiful, bulk newsletter emails.
Benchmark Email Lite
benchmark-email-lite
Your Wordpress Site and Email Marketing all in one place!
Contact Form 7 GetResponse Extension
contact-form-7-getresponse-extension
A very easy plugin to integrate GetResponse campaigns with Contact Form 7.
Email Marketing Plugin – WP Email Capture
wp-email-capture
Double opt-in form for building your email list. Define landing pages to distribute your ebooks & software.
WebJunk PHPList Developer Profile
3 plugins · 90 total installs
How We Detect WebJunk PHPList
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/webjunk-phplist/css/style.css/wp-content/plugins/webjunk-phplist/js/script.js/wp-content/plugins/webjunk-phplist/js/script.jswebjunk-phplist/css/style.css?ver=webjunk-phplist/js/script.js?ver=HTML / DOM Fingerprints
wjphplist-subscribe-form<!-- webjunk-phplist starts --><!-- webjunk-phplist ends -->data-wjphplist-actionwindow.wj_phplist_configvar wj_phplist_config[webjunk_phplist_subscribe_form][webjunk_phplist_display_archive]