WP Signals Security & Risk Analysis

wordpress.org/plugins/wp-signals

Become a data-driven marketer. Setup your Facebook pixels in less than a minute with our powerful Wizard. Try it out now for free.

10 active installs v2.0.0 PHP 7.2+ WP 5.1+ Updated May 5, 2021
facebook-conversions-apifacebook-javascript-pixelfacebook-pixelfacebook-pixel-events
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Signals Safe to Use in 2026?

Generally Safe

Score 85/100

WP Signals has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "wp-signals" v2.0.0 plugin presents a mixed security posture. On the positive side, it demonstrates good practices regarding SQL query handling by exclusively using prepared statements, and it has no known historical vulnerabilities (CVEs). This suggests a potentially well-maintained and audited codebase in the past.

However, significant concerns arise from the static analysis. The plugin exposes two REST API routes without any permission callbacks, creating a substantial attack surface with direct, unprotected entry points. Furthermore, the taint analysis reveals that all seven analyzed flows involve unsanitized paths, though thankfully these did not escalate to critical or high severity in this analysis. The presence of dangerous functions like `set_time_limit` without clear context can also be a risk if not properly managed. The relatively low percentage of properly escaped output (46%) also indicates a potential for cross-site scripting (XSS) vulnerabilities.

In conclusion, while the absence of historical vulnerabilities and sound SQL practices are strengths, the unprotected REST API endpoints and unsanitized taint flows are critical security weaknesses that require immediate attention. The overall risk is moderate, leaning towards high due to the open attack surface.

Key Concerns

  • REST API routes without permission callbacks
  • Taint flows with unsanitized paths
  • Low percentage of properly escaped output
  • Dangerous function usage (set_time_limit)
  • No nonce checks on entry points
Vulnerabilities
None known

WP Signals Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Signals Release Timeline

v2.0.0Current
v1.0.1
v1.0.0
Code Analysis
Analyzed Apr 16, 2026

WP Signals Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
68
57 escaped
Nonce Checks
0
Capability Checks
8
File Operations
1
External Requests
4
Bundled Libraries
0

Dangerous Functions Found

set_time_limitset_time_limit(0);Includes/Updater.php:45
set_time_limitset_time_limit(30);Includes/Updater.php:84

Output Escaping

46% escaped125 total outputs
Data Flows · Security
7 unsanitized

Data Flow Analysis

7 flows7 with unsanitized paths
render (Admin/screens/Analytics.php:61)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

WP Signals Attack Surface

Entry Points2
Unprotected2

REST API Routes 2

POST/wp-json/wp-signals/v1/sseFrontend/Frontend.php:133
POST/wp-json/wp-signals/v1/alFrontend/Frontend.php:138
WordPress Hooks 17
actionadmin_enqueue_scriptsAdmin/Admin.php:75
actionadmin_enqueue_scriptsAdmin/Admin.php:76
actionadmin_menuAdmin/Settings.php:105
actionrest_api_initFrontend/Frontend.php:131
actionwp_headFrontend/Frontend.php:154
actionwp_footerFrontend/Frontend.php:156
actionwp_headFrontend/Frontend.php:162
actionwp_footerFrontend/Frontend.php:164
actionwoocommerce_add_to_cartFrontend/Frontend.php:196
actionwoocommerce_thankyou_order_idFrontend/Frontend.php:197
actionwpcf7_submitFrontend/Frontend.php:201
actionmc4wp_form_subscribedFrontend/Frontend.php:205
actionfrm_after_create_entryFrontend/Frontend.php:209
actionplugins_loadedFrontend/Frontend.php:212
actionplugins_loadedIncludes/I18n.php:49
actionwpmu_new_blogwp-signals.php:80
actionplugins_loadedwp-signals.php:92
Maintenance & Trust

WP Signals Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedMay 5, 2021
PHP min version7.2
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

WP Signals Developer Profile

romelprashad

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Signals

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-signals/Admin/css/wp-signals-admin.min.css/wp-content/plugins/wp-signals/Admin/css/wp-signals-admin.css/wp-content/plugins/wp-signals/public/css/wp-signals-public.min.css/wp-content/plugins/wp-signals/public/css/wp-signals-public.css/wp-content/plugins/wp-signals/public/js/wp-signals-public.min.js/wp-content/plugins/wp-signals/public/js/wp-signals-public.js
Version Parameters
wp-signals-admin.css?ver=wp-signals-admin.min.css?ver=wp-signals-public.css?ver=wp-signals-public.min.css?ver=wp-signals-public.js?ver=wp-signals-public.min.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Signals