Telehooks SMS Notifications Security & Risk Analysis

wordpress.org/plugins/woo-telehooks-sms-notifications

Telehooks provides SMS Notification Services

0 active installs v2.0 PHP 5.0+ WP 3.5+ Updated Unknown
notifysmstelehookswoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Telehooks SMS Notifications Safe to Use in 2026?

Generally Safe

Score 100/100

Telehooks SMS Notifications has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The static analysis of the 'woo-telehooks-sms-notifications' plugin v2.0 reveals a generally strong security posture in several key areas. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's external attack surface. Furthermore, the code signals indicate a lack of dangerous functions, no direct SQL queries (all using prepared statements), and no file operations or external HTTP requests, which are common vectors for vulnerabilities. The taint analysis showing zero flows, especially critical or high severity ones, is also a very positive sign.

However, there are notable areas for concern. The complete absence of nonce checks and capability checks, particularly when considering the potential for future development or if the plugin has undocumented entry points, represents a significant weakness. While the current analysis shows zero unprotected entry points, the lack of these fundamental security mechanisms means that any future additions, or if the current code is more complex than what's evident in the provided metrics, could be vulnerable to CSRF or privilege escalation attacks.

The plugin's vulnerability history is currently clean, with no recorded CVEs. This, combined with the strong coding practices observed in areas like SQL querying, suggests a development team that is, at present, prioritizing security. Nevertheless, the lack of inherent protection mechanisms like nonce and capability checks means that the plugin is not as robustly secured as it could be, and relies heavily on external factors or future careful development to remain secure.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Unescaped output (33% not properly escaped)
Vulnerabilities
None known

Telehooks SMS Notifications Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Telehooks SMS Notifications Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped6 total outputs
Attack Surface

Telehooks SMS Notifications Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actiontelehooks_initinit.php:79
actionadmin_noticesinit.php:94
actionadmin_noticesinit.php:96
actionplugins_loadedinit.php:106
actionadmin_menutelehooks.php:16
actionadmin_inittelehooks.php:20
Maintenance & Trust

Telehooks SMS Notifications Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedUnknown
PHP min version5.0
Downloads942

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Telehooks SMS Notifications Developer Profile

Onjection

2 plugins · 200 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Telehooks SMS Notifications

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Telehooks SMS Notifications