WPS Notice Center Security & Risk Analysis

wordpress.org/plugins/wps-notice-center

WPS Notice Center makes it possible to hide all the instructions and to combine them in a single record to unfold. Take full advantage of your WordPre …

3K active installs v1.2.8.1 PHP 7.0+ WP 4.2+ Updated Jun 24, 2025
admindisablehidenagsnotice
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WPS Notice Center Safe to Use in 2026?

Generally Safe

Score 100/100

WPS Notice Center has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9mo ago
Risk Assessment

The "wps-notice-center" v1.2.8.1 plugin presents a mixed security posture. On the positive side, the static analysis reveals no known vulnerabilities in its history and a complete absence of direct SQL queries, dangerous functions, file operations, and external HTTP requests that could be exploited. The attack surface is also reported as zero, with no AJAX handlers, REST API routes, shortcodes, or cron events, which is a strong indicator of good security design.

However, significant concerns arise from the lack of output escaping and the absence of nonce and capability checks. The fact that 100% of its outputs are unescaped suggests a high potential for Cross-Site Scripting (XSS) vulnerabilities, as user-controlled data could be injected directly into the page. The complete lack of nonce and capability checks is also alarming, as it implies that any entry points, if they were to exist, would be unprotected and potentially exploitable by unauthenticated users. The zero taint flows are positive but do not negate the risks posed by unescaped output and missing authorization checks.

In conclusion, while the plugin has a clean vulnerability history and avoids common pitfalls like raw SQL and dangerous functions, the identified issues in output escaping and authorization checks represent serious security weaknesses. The absence of any recorded vulnerabilities in the past is a good sign, but the current code analysis reveals significant potential for exploitation, particularly XSS, and a general lack of robust security controls.

Key Concerns

  • Output escaping not implemented
  • No capability checks
  • No nonce checks
Vulnerabilities
None known

WPS Notice Center Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WPS Notice Center Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

WPS Notice Center Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_enqueue_scriptsclasses\plugin.php:10
actionadmin_noticesclasses\plugin.php:11
actionadmin_noticesclasses\plugin.php:12
actionadmin_footerclasses\plugin.php:13
actionplugins_loadedwps-notice-center.php:32
Maintenance & Trust

WPS Notice Center Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJun 24, 2025
PHP min version7.0
Downloads55K

Community Trust

Rating100/100
Number of ratings6
Active installs3K
Developer Profile

WPS Notice Center Developer Profile

NicolasKulka

9 plugins · 149K total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
1444 days
View full developer profile
Detection Fingerprints

How We Detect WPS Notice Center

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wps-notice-center/assets/css/style.css
Version Parameters
wps-notice-center/assets/css/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
wps-notice-centerpending-countnotice-blockcounter-bgeaster-eggs
Data Attributes
aria-expanded
JS Globals
WPS
FAQ

Frequently Asked Questions about WPS Notice Center