WP Zombaio Security & Risk Analysis

wordpress.org/plugins/wp-zombaio

Catches Information from the Adult Payment Gateway Zombaio and acts accordingly

10 active installs v1.0.6.2 PHP + WP 3.4.2+ Updated Dec 15, 2013
adultmembershipzombaio
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Zombaio Safe to Use in 2026?

Generally Safe

Score 85/100

WP Zombaio has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The wp-zombaio plugin v1.0.6.2 exhibits a mixed security posture. On the positive side, it demonstrates good practices by not having any known CVEs, critical or high severity vulnerabilities in its history, and it employs prepared statements for all SQL queries. Furthermore, it includes nonce and capability checks, and has a limited attack surface with no AJAX handlers or REST API routes exposed without authentication.

However, a significant concern arises from the static analysis. The plugin has a complete lack of output escaping, meaning that all 136 outputs are potentially vulnerable to cross-site scripting (XSS) attacks. Additionally, the taint analysis reveals 3 flows with unsanitized paths, one of which is of high severity, indicating potential for sensitive data leakage or execution of malicious code. The presence of these unsanitized flows, despite the absence of explicit dangerous functions, points to an oversight in handling user-supplied data before it is used in potentially sensitive operations.

While the plugin's vulnerability history is clean, the static analysis findings, particularly the universal lack of output escaping and the high-severity unsanitized taint flow, represent significant risks. The clean history might suggest that these issues have not been exploited in the past, or that the plugin is less widely used, but it does not negate the inherent security flaws. In conclusion, the plugin has strengths in its input handling for SQL and its limited authenticated attack surface, but the severe lack of output escaping and the identified unsanitized taint flows present a considerable security risk that needs immediate attention.

Key Concerns

  • 0% properly escaped output
  • 1 high severity taint flow
  • 3 unsanitized path flows
Vulnerabilities
None known

WP Zombaio Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Zombaio Release Timeline

v1.0.6.2Current
v1.0.6
v1.0.4
v1.0.2
v1.0.0
Code Analysis
Analyzed Mar 17, 2026

WP Zombaio Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
136
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

0% escaped136 total outputs
Data Flows · Security
3 unsanitized

Data Flow Analysis

4 flows3 with unsanitized paths
admin_page (wp_zombaio.php:416)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Zombaio Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[zombaio_seal] wp_zombaio.php:1241
[zombaio_join] wp_zombaio.php:1242
[zombaio_login] wp_zombaio.php:1243
WordPress Hooks 21
actioninitwp_zombaio.php:101
actionplugins_loadedwp_zombaio.php:102
actionwidgets_initwp_zombaio.php:103
filterwp_authenticate_userwp_zombaio.php:104
actionadmin_noticeswp_zombaio.php:226
actionadmin_menuwp_zombaio.php:227
actionadmin_headwp_zombaio.php:228
actionadmin_enqueue_scriptswp_zombaio.php:229
actionadd_meta_boxeswp_zombaio.php:232
actionsave_postwp_zombaio.php:233
actionwp_enqueue_scriptswp_zombaio.php:1245
actiontemplate_redirectwp_zombaio.php:1247
actionsave_postwp_zombaio.php:1391
actiondeleted_postwp_zombaio.php:1392
actionswitch_themewp_zombaio.php:1393
actionsave_postwp_zombaio.php:1467
actiondeleted_postwp_zombaio.php:1468
actionswitch_themewp_zombaio.php:1469
actionsave_postwp_zombaio.php:1512
actiondeleted_postwp_zombaio.php:1513
actionswitch_themewp_zombaio.php:1514
Maintenance & Trust

WP Zombaio Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedDec 15, 2013
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

WP Zombaio Developer Profile

Barry Carlyon

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Zombaio

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-zombaio/js/admin.js/wp-content/plugins/wp-zombaio/js/frontend.js/wp-content/plugins/wp-zombaio/css/admin.css/wp-content/plugins/wp-zombaio/css/frontend.css
Script Paths
/wp-content/plugins/wp-zombaio/js/admin.js/wp-content/plugins/wp-zombaio/js/frontend.js
Version Parameters
wp-zombaio/js/admin.js?ver=wp-zombaio/js/frontend.js?ver=wp-zombaio/css/admin.css?ver=wp-zombaio/css/frontend.css?ver=

HTML / DOM Fingerprints

Data Attributes
data-zombaio-site-iddata-zombaio-gw-pass
JS Globals
window.zombaio_settings
FAQ

Frequently Asked Questions about WP Zombaio