WP-Polls (with CubePoints) Security & Risk Analysis

wordpress.org/plugins/wp-polls-with-cubepoints

WP-Polls (with CubePoints) is a modified version of [WP-Polls](http://wordpress.org/extend/plugins/wp-polls/ "WP-Polls") by Lester 'GaM …

10 active installs v1.0 PHP + WP 2.8+ Updated Unknown
boothpollpollingpollsvote
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Polls (with CubePoints) Safe to Use in 2026?

Generally Safe

Score 100/100

WP-Polls (with CubePoints) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The security posture of wp-polls-with-cubepoints v1.0 presents a mixed bag of concerning and positive indicators. While the plugin has no recorded vulnerability history, suggesting a historically stable codebase, the static analysis reveals significant potential weaknesses. A striking concern is the complete absence of prepared statements for any of the 73 SQL queries, making the plugin highly susceptible to SQL injection vulnerabilities. Furthermore, only 44% of output escaping is properly handled, indicating a risk of Cross-Site Scripting (XSS) vulnerabilities. The presence of two unsanitized paths in the taint analysis, one of which is rated as high severity, directly points to potential security flaws that require immediate attention.

On the positive side, the plugin demonstrates good practices by not exposing external HTTP requests and has no file operations that could be exploited. It also utilizes capability checks, which is a fundamental security measure. However, the lack of nonce checks on its entry points (shortcodes and cron events) is a notable oversight that could be leveraged for Cross-Site Request Forgery (CSRF) attacks. The bundled TinyMCE library, while common, could also introduce risks if it's an outdated version, though this is not explicitly detailed in the provided data. In conclusion, despite a clean vulnerability history, the extensive use of raw SQL, inadequate output escaping, and the identified high-severity taint flow, coupled with the absence of nonce checks, present a substantial risk that needs remediation.

Key Concerns

  • Raw SQL queries without prepared statements
  • High severity taint flow identified
  • Low output escaping percentage
  • Unsanitized paths in taint analysis
  • Lack of nonce checks on entry points
Vulnerabilities
None known

WP-Polls (with CubePoints) Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-Polls (with CubePoints) Code Analysis

Dangerous Functions
0
Raw SQL Queries
73
0 prepared
Unescaped Output
214
171 escaped
Nonce Checks
0
Capability Checks
10
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

TinyMCE

SQL Query Safety

0% prepared73 total queries

Output Escaping

44% escaped385 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

8 flows2 with unsanitized paths
<wp-polls> (wp-polls.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP-Polls (with CubePoints) Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[page_polls] wp-polls.php:737
[poll] wp-polls.php:744
WordPress Hooks 18
actioninitwp-polls.php:43
actionadmin_menuwp-polls.php:57
actionwp_headwp-polls.php:175
actionwp_enqueue_scriptswp-polls.php:204
actionadmin_enqueue_scriptswp-polls.php:234
actionadmin_footer-post-new.phpwp-polls.php:261
actionadmin_footer-post.phpwp-polls.php:262
actionadmin_footer-page-new.phpwp-polls.php:263
actionadmin_footer-page.phpwp-polls.php:264
filterfavorite_actionswp-polls.php:308
actioninitwp-polls.php:316
filtermce_external_pluginswp-polls.php:322
filtermce_buttonswp-polls.php:323
actionpolls_cronwp-polls.php:1219
filterwp_stats_page_admin_pluginswp-polls.php:1345
filterwp_stats_page_pluginswp-polls.php:1346
actionwidgets_initwp-polls.php:1464
actionactivate_wp-polls/wp-polls.phpwp-polls.php:1471

Scheduled Events 2

polls_cron
polls_cron
Maintenance & Trust

WP-Polls (with CubePoints) Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedUnknown
PHP min version
Downloads13K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP-Polls (with CubePoints) Developer Profile

Jonathan Lau

2 plugins · 20 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-Polls (with CubePoints)

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-polls-with-cubepoints/polls-admin.css/wp-content/plugins/wp-polls-with-cubepoints/polls-js.js/wp-content/plugins/wp-polls-with-cubepoints/polls.css/wp-content/plugins/wp-polls-with-cubepoints/polls-vote.js
Script Paths
/wp-content/plugins/wp-polls-with-cubepoints/polls-js.js/wp-content/plugins/wp-polls-with-cubepoints/polls-vote.js
Version Parameters
wp-polls-with-cubepoints/polls-admin.css?ver=wp-polls-with-cubepoints/polls-js.js?ver=wp-polls-with-cubepoints/polls.css?ver=wp-polls-with-cubepoints/polls-vote.js?ver=

HTML / DOM Fingerprints

CSS Classes
wp-pollspollbar
Data Attributes
pollq_idpollq_activepollq_questionpollq_stylepollq_timestamppollq_active+24 more
JS Globals
poll_ajax_url
Shortcode Output
[poll id=[poll][poll vote=
FAQ

Frequently Asked Questions about WP-Polls (with CubePoints)