WIP Incoming Lite Security & Risk Analysis

wordpress.org/plugins/wip-incoming-lite

WIP Incoming Lite is a free Coming Soon, Under Construction & Maintenance Mode WordPress plugin and allows you to manage a launch / under construc …

200 active installs v1.1.2 PHP + WP 3.5.0+ Updated Nov 25, 2024
coming-sooncoming-soon-pageconstructionpluginsthemes
91
A · Safe
CVEs total1
Unpatched0
Last CVENov 20, 2024
Safety Verdict

Is WIP Incoming Lite Safe to Use in 2026?

Generally Safe

Score 91/100

WIP Incoming Lite has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Nov 20, 2024Updated 1yr ago
Risk Assessment

The "wip-incoming-lite" plugin v1.1.2 presents a mixed security posture. On one hand, the static analysis indicates a very small attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events. This is a positive sign as it limits potential entry points for attackers. However, the presence of dangerous functions like `unserialize` is a significant concern, as is the fact that 100% of its single SQL query does not use prepared statements, making it vulnerable to SQL injection. The low percentage of properly escaped output (16%) also suggests a risk of Cross-Site Scripting (XSS) vulnerabilities.

The vulnerability history reveals one past medium-severity CVE, specifically a Cross-Site Request Forgery (CSRF) vulnerability. While there are no currently unpatched vulnerabilities, the presence of a past CSRF issue, combined with the lack of robust input sanitization and output escaping in the code analysis, suggests a pattern of potential weaknesses. The taint analysis shows a flow with an unsanitized path, further reinforcing concerns about input handling.

In conclusion, while the plugin has a limited attack surface, the identified code quality issues, particularly the unescaped output, raw SQL queries, and the use of `unserialize`, coupled with a history of a medium-severity vulnerability, warrant caution. Developers should prioritize addressing these areas to improve the plugin's overall security.

Key Concerns

  • SQL queries not using prepared statements
  • Dangerous function usage (unserialize)
  • Low percentage of properly escaped output
  • Flow with unsanitized paths in taint analysis
  • Medium severity CVE in vulnerability history
Vulnerabilities
1 published

WIP Incoming Lite Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-11416medium · 6.1Cross-Site Request Forgery (CSRF)

WIP Incoming Lite <= 1.1.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting

Nov 20, 2024 Patched in 1.1.2 (5d)
Version History

WIP Incoming Lite Release Timeline

v1.1.2Current
v1.1.11 CVE
v1.1.01 CVE
v1.0.91 CVE
v1.0.81 CVE
v1.0.71 CVE
v1.0.61 CVE
v1.0.51 CVE
v1.0.41 CVE
v1.0.31 CVE
v1.0.21 CVE
v1.0.11 CVE
v1.0.01 CVE
Code Analysis
Analyzed Mar 16, 2026

WIP Incoming Lite Code Analysis

Dangerous Functions
2
Raw SQL Queries
1
0 prepared
Unescaped Output
122
23 escaped
Nonce Checks
2
Capability Checks
1
File Operations
2
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$options = unserialize(file_get_contents($_FILES["wip_incoming_lite_upload_file"]["tmp_name"]));core\includes\class-panel.php:155
unserializeupdate_option( $this->plugin_optionname, unserialize($option->option_value));core\includes\class-panel.php:160

SQL Query Safety

0% prepared1 total queries

Output Escaping

16% escaped145 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
wip_incoming_lite_panel (core\includes\class-panel.php:256)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WIP Incoming Lite Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_noticescore\includes\class-notice.php:19
actionadmin_headcore\includes\class-notice.php:20
actionadmin_menucore\includes\class-panel.php:19
actionadmin_initcore\includes\class-panel.php:20
actionadmin_initcore\includes\class-panel.php:21
actioninitinit.php:42
actionplugins_loadedinit.php:43
actiontemplate_redirectinit.php:45
Maintenance & Trust

WIP Incoming Lite Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 25, 2024
PHP min version
Downloads10K

Community Trust

Rating0/100
Number of ratings0
Active installs200
Developer Profile

WIP Incoming Lite Developer Profile

alexvtn

76 plugins · 10K total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
168 days
View full developer profile
Detection Fingerprints

How We Detect WIP Incoming Lite

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wip-incoming-lite/assets/css/notice.css/wp-content/plugins/wip-incoming-lite/assets/css/panel.css/wp-content/plugins/wip-incoming-lite/assets/css/on_off.css/wp-content/plugins/wip-incoming-lite/assets/css/jquery-ui.css/wp-content/plugins/wip-incoming-lite/assets/js/on_off.js/wp-content/plugins/wip-incoming-lite/assets/js/panel.js
Script Paths
/wp-content/plugins/wip-incoming-lite/core/functions.wip-incoming-lite.php
Version Parameters
wip-incoming-lite/style.css?ver=wip-incoming-lite/assets/css/notice.css?ver=wip-incoming-lite/assets/css/panel.css?ver=wip-incoming-lite/assets/css/on_off.css?ver=wip-incoming-lite/assets/css/jquery-ui.css?ver=wip-incoming-lite/assets/js/on_off.js?ver=wip-incoming-lite/assets/js/panel.js?ver=

HTML / DOM Fingerprints

CSS Classes
WIP_plugin_panel_messagewip-incoming-lite-countdown-timer
Data Attributes
data-wip-incoming-tab
JS Globals
wip_incoming_settingwip_incoming_countdown
FAQ

Frequently Asked Questions about WIP Incoming Lite