AcyMailing integration for Advanced Custom Fields (ACF) Security & Risk Analysis

wordpress.org/plugins/acymailing-integration-for-acf

Insert custom posts from Advanced Custom Fields in your emails. Automatically generate monthly newsletters including the last posts.

10 active installs v2.2 PHP + WP + Updated Feb 26, 2026
acfacymailingadvanced-custom-fieldsintegrationnewsletter
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is AcyMailing integration for Advanced Custom Fields (ACF) Safe to Use in 2026?

Generally Safe

Score 100/100

AcyMailing integration for Advanced Custom Fields (ACF) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "acymailing-integration-for-acf" v2.2 plugin exhibits a generally good security posture, with no reported vulnerabilities or critical findings in the static and taint analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, all detected SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are positive indicators of secure coding practices. However, the presence of the `unserialize` function, even without explicit taint flows or vulnerability history, presents a potential risk. While no current vulnerabilities are recorded, the `unserialize` function can be a vector for unserialize vulnerabilities if improperly handled with user-supplied data. The lack of nonce and capability checks is also a concern, as it implies that any entry points, if they were to emerge in future versions or through misconfigurations, would lack essential authorization and integrity checks. The plugin's clean vulnerability history is a strong positive, suggesting diligent maintenance and a focus on security by the developers. Overall, the plugin is well-secured against common attack vectors based on the provided data, but the `unserialize` function and the absence of specific authorization checks warrant attention for future development.

Key Concerns

  • Use of unserialize function
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

AcyMailing integration for Advanced Custom Fields (ACF) Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

AcyMailing integration for Advanced Custom Fields (ACF) Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
2
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$settings = unserialize($customField->post_content);AcfInsertion.php:75

Output Escaping

67% escaped6 total outputs
Attack Surface

AcyMailing integration for Advanced Custom Fields (ACF) Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionacym_load_installed_integrationsacymailing-acf.php:26
Maintenance & Trust

AcyMailing integration for Advanced Custom Fields (ACF) Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 26, 2026
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

AcyMailing integration for Advanced Custom Fields (ACF) Developer Profile

AcyMailing Newsletter Team

20 plugins · 8K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
298 days
View full developer profile
Detection Fingerprints

How We Detect AcyMailing integration for Advanced Custom Fields (ACF)

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about AcyMailing integration for Advanced Custom Fields (ACF)