Woo SMS Gateway Security & Risk Analysis

wordpress.org/plugins/woo-smsgateway

Automatically send sms notification on new order creation to the customer. Admin Settings Page Help Page

10 active installs v1.0.0 PHP 5.2.4+ WP 4.6+ Updated Jun 5, 2018
freenotificationssmssmsgatewaywoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Woo SMS Gateway Safe to Use in 2026?

Generally Safe

Score 85/100

Woo SMS Gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "woo-smsgateway" plugin version 1.0.0 exhibits a strong security posture based on the provided static analysis. The absence of identified dangerous functions, raw SQL queries, file operations, external HTTP requests, and a lack of taint analysis flows with unsanitized paths are all positive indicators. Furthermore, the presence of capability checks suggests an awareness of access control. The plugin also appears to have a clean vulnerability history, with no recorded CVEs.

However, the analysis does reveal areas for improvement. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events, while reducing the attack surface, could also indicate limited functionality or an incomplete implementation, which may or may not be intentional. More critically, the lack of any nonce checks on the identified entry points (even though there are none) is a notable weakness. While there are currently no AJAX handlers to exploit this, if any are added in the future without proper nonce implementation, it could lead to CSRF vulnerabilities. The 33% of improperly escaped output also presents a potential XSS risk if these outputs are ever user-controllable.

Overall, the plugin demonstrates good practices by avoiding common pitfalls like raw SQL and dangerous functions. The clean history is reassuring. However, the lack of nonce checks and imperfect output escaping represent actionable security concerns that should be addressed to further harden the plugin's defenses, especially if its functionality is expanded in the future.

Key Concerns

  • Improperly escaped output detected
  • Missing nonce checks on potential entry points
Vulnerabilities
None known

Woo SMS Gateway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Woo SMS Gateway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
4 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped6 total outputs
Attack Surface

Woo SMS Gateway Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_initadmin-page.php:19
actionadmin_menuadmin-page.php:32
actionwoocommerce_thankyouwo-smsgateway.php:20
Maintenance & Trust

Woo SMS Gateway Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJun 5, 2018
PHP min version5.2.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Woo SMS Gateway Developer Profile

hamzarauf

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Woo SMS Gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Woo SMS Gateway