
Add-on WooCommerce – MailPoet 3 Security & Risk Analysis
wordpress.org/plugins/add-on-woocommerce-mailpoetLet your customers subscribe to your MailPoet 3 newsletter as they checkout from WooCommerce with their purchase.
Is Add-on WooCommerce – MailPoet 3 Safe to Use in 2026?
Generally Safe
Score 92/100Add-on WooCommerce – MailPoet 3 has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "add-on-woocommerce-mailpoet" plugin v1.1.10 presents a mixed security posture. On the positive side, the plugin has no recorded CVEs, a clean vulnerability history, and a seemingly small attack surface based on the static analysis (zero AJAX handlers, REST API routes, shortcodes, or cron events without checks). This indicates a potential for good security practices in core areas. However, significant concerns arise from the code analysis. The complete lack of output escaping for all 12 identified outputs is a major weakness, potentially leading to cross-site scripting (XSS) vulnerabilities. Furthermore, the single SQL query is not using prepared statements, posing a risk of SQL injection. The two identified taint flows with unsanitized paths, even if not classified as critical or high severity in the provided data, are concerning and warrant further investigation as they suggest potential for insecure data handling.
Despite the lack of documented vulnerabilities, the presence of unescaped output and raw SQL queries, coupled with unsanitized taint flows, creates tangible risks. The absence of nonce and capability checks, while not directly tied to an attack surface in this specific analysis, is a general best practice that is being overlooked. The plugin's strengths lie in its lack of external dependencies and a clean historical record, but the identified code-level weaknesses represent immediate threats that could be exploited if an attacker discovers a way to trigger these insecure code paths.
Key Concerns
- All outputs are unescaped
- SQL queries not using prepared statements
- Taint flows with unsanitized paths
- No nonce checks
- No capability checks
Add-on WooCommerce – MailPoet 3 Security Vulnerabilities
Add-on WooCommerce – MailPoet 3 Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Add-on WooCommerce – MailPoet 3 Attack Surface
WordPress Hooks 9
Maintenance & Trust
Add-on WooCommerce – MailPoet 3 Maintenance & Trust
Maintenance Signals
Community Trust
Add-on WooCommerce – MailPoet 3 Alternatives
MailPoet Checkout Subscription for WooCommerce (Legacy)
mailpoet-woocommerce-add-on
Let your customers subscribe to your newsletters as they checkout with their purchase.
Ninja Forms – MailPoet
ninja-forms-mailpoet
This extension integrates Ninja Forms with MailPoet by providing an option to add users who submit a form to an existing newsletter.
Carrot quest
carrot-quest
Carrot quest совмещает в себе все инструменты для автоматизации маркетинга, продаж и коммуникации с пользователями. Поддерживает WooCommerce 5.x, 6.
MailPoet Gravity Forms Add-on
mailpoet-gravity-forms-add-on
Adds a new field for you to allow your visitors to subscriber to your MailPoet newsletters.
WangGuard – MailPoet Connector
wangguard-wysija-newsletter-connector
WangGuard - MailPoet Connector is a plugin for connect WangGuard plugin with MailPoet.
Add-on WooCommerce – MailPoet 3 Developer Profile
4 plugins · 7K total installs
How We Detect Add-on WooCommerce – MailPoet 3
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/add-on-woocommerce-mailpoet/assets/css/style.css/wp-content/plugins/add-on-woocommerce-mailpoet/assets/js/script.js/wp-content/plugins/add-on-woocommerce-mailpoet/assets/js/script.jsadd-on-woocommerce-mailpoet/assets/css/style.css?ver=add-on-woocommerce-mailpoet/assets/js/script.js?ver=HTML / DOM Fingerprints
mpwa-checkbox-wrappermpwa-label-wrappermpwa-checkbox-inputmpwa-list-checkbox-wrappermpwa-list-label-wrappermpwa-list-checkbox-inputmailpoet-woocommerce-checkout-wrapdata-mpwa-enable-subscriptiondata-mpwa-is-required