WePOP Security & Risk Analysis

wordpress.org/plugins/wepop

A lightweight, dependency-free lightbox plugin for WordPress. Supports images and videos without jQuery.

20 active installs v1.6.2 PHP 7.4+ WP 5.0+ Updated Mar 8, 2026
galleryimagelightboxpopupvideo
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WePOP Safe to Use in 2026?

Generally Safe

Score 100/100

WePOP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 29d ago
Risk Assessment

Based on the static analysis and vulnerability history provided, the 'wepop' plugin v1.6.2 exhibits a strong security posture. The code demonstrates excellent adherence to secure coding practices, with all identified SQL queries utilizing prepared statements, all output being properly escaped, and robust use of nonce and capability checks for its entry points. The absence of known CVEs and a clean vulnerability history further contribute to its favorable security assessment. There are no detected dangerous functions, file operations, or external HTTP requests, which are common sources of vulnerabilities.

While the static analysis does not reveal any critical or high-severity taint flows, nor any insecurely exposed entry points (AJAX handlers, REST API routes), the overall attack surface is very small. The plugin presents a single REST API route, which has an associated permission callback, meaning it is not directly exposed to unauthorized access. The absence of shortcodes and cron events also limits potential attack vectors. Therefore, the plugin appears to be well-developed from a security perspective with no immediate red flags.

Vulnerabilities
None known

WePOP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WePOP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
1
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped3 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
wepop_save_settings (includes\config.php:19)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WePOP Attack Surface

Entry Points1
Unprotected0

REST API Routes 1

POST/wp-json/wepop/v1/disablewepop.php:182
WordPress Hooks 8
actionadmin_menuincludes\config.php:16
actionadmin_initincludes\config.php:48
actioninitwepop.php:52
filterthe_contentwepop.php:91
actionwp_enqueue_scriptswepop.php:130
actionwp_footerwepop.php:141
actionenqueue_block_editor_assetswepop.php:175
actionrest_api_initwepop.php:181
Maintenance & Trust

WePOP Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 8, 2026
PHP min version7.4
Downloads717

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

WePOP Developer Profile

WeDOK

1 plugin · 20 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WePOP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wepop/css/popup.css/wp-content/plugins/wepop/js/popup.js/wp-content/plugins/wepop/js/editor.js
Script Paths
/wp-content/plugins/wepop/js/popup.js/wp-content/plugins/wepop/js/editor.js

HTML / DOM Fingerprints

Data Attributes
data-wepop
JS Globals
wedokPopSettingswepopEditorText
REST Endpoints
/wepop/v1/disable
FAQ

Frequently Asked Questions about WePOP