Add Email Signature Security & Risk Analysis

wordpress.org/plugins/add-email-signature

This plugin adds a configurable signature to all outgoing emails from your WordPress site.

200 active installs v1.0.4 PHP + WP 3.2+ Updated Mar 25, 2026
add-signatureemailmailsignature
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Add Email Signature Safe to Use in 2026?

Generally Safe

Score 100/100

Add Email Signature has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

Based on the static analysis, the 'add-email-signature' plugin v1.0.4 exhibits a strong security posture in several key areas. The absence of any reported CVEs, dangerous functions, raw SQL queries, file operations, or external HTTP requests is highly commendable. The plugin also seems to lack a significant attack surface, with zero identified entry points and no unprotected handlers or routes.

However, a critical concern arises from the output escaping signals, where 100% of the identified outputs are not properly escaped. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is directly reflected in the output without sanitization. While taint analysis shows no flows with unsanitized paths, the lack of output escaping means that even if the data isn't directly originating from a malicious source, it could still be manipulated and lead to an XSS exploit if it's user-controlled input passed through internal logic before output.

Given the clean vulnerability history and lack of critical code signals, the plugin appears to be well-maintained and developed with security in mind, with the exception of the output escaping. This singular weakness, if exploited, could allow an attacker to inject malicious scripts into pages rendered by the plugin, leading to various security compromises. Therefore, while generally secure, the unescaped output represents a significant, actionable vulnerability.

Key Concerns

  • All identified outputs are unescaped
Vulnerabilities
None known

Add Email Signature Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Add Email Signature Release Timeline

v1.0.4Current
v1.0.3
v1.0.2
v1.0.1
Code Analysis
Analyzed Mar 16, 2026

Add Email Signature Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Add Email Signature Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionphpmailer_initadd-email-signature.php:46
actionadmin_menuoptions.php:10
actionadmin_initoptions.php:11
filterplugin_action_linksoptions.php:121
Maintenance & Trust

Add Email Signature Maintenance & Trust

Maintenance Signals

WordPress version tested7.0
Last updatedMar 25, 2026
PHP min version
Downloads14K

Community Trust

Rating100/100
Number of ratings2
Active installs200
Developer Profile

Add Email Signature Developer Profile

David Anderson / Team Updraft

16 plugins · 6.4M total installs

77
trust score
Avg Security Score
97/100
Avg Patch Time
1159 days
View full developer profile
Detection Fingerprints

How We Detect Add Email Signature

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/add-email-signature/add-email-signature.php
Version Parameters
add-email-signature.php?ver=1.0.4

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Add Email Signature