Add-on WooCommerce – MailPoet 3 Security & Risk Analysis

wordpress.org/plugins/add-on-woocommerce-mailpoet

Let your customers subscribe to your MailPoet 3 newsletter as they checkout from WooCommerce with their purchase.

600 active installs v1.1.10 PHP 7.2+ WP 5.2+ Updated Jan 30, 2025
e-commercemailmailpoetwoocommercewysija
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Add-on WooCommerce – MailPoet 3 Safe to Use in 2026?

Generally Safe

Score 92/100

Add-on WooCommerce – MailPoet 3 has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "add-on-woocommerce-mailpoet" plugin v1.1.10 presents a mixed security posture. On the positive side, the plugin has no recorded CVEs, a clean vulnerability history, and a seemingly small attack surface based on the static analysis (zero AJAX handlers, REST API routes, shortcodes, or cron events without checks). This indicates a potential for good security practices in core areas. However, significant concerns arise from the code analysis. The complete lack of output escaping for all 12 identified outputs is a major weakness, potentially leading to cross-site scripting (XSS) vulnerabilities. Furthermore, the single SQL query is not using prepared statements, posing a risk of SQL injection. The two identified taint flows with unsanitized paths, even if not classified as critical or high severity in the provided data, are concerning and warrant further investigation as they suggest potential for insecure data handling.

Despite the lack of documented vulnerabilities, the presence of unescaped output and raw SQL queries, coupled with unsanitized taint flows, creates tangible risks. The absence of nonce and capability checks, while not directly tied to an attack surface in this specific analysis, is a general best practice that is being overlooked. The plugin's strengths lie in its lack of external dependencies and a clean historical record, but the identified code-level weaknesses represent immediate threats that could be exploited if an attacker discovers a way to trigger these insecure code paths.

Key Concerns

  • All outputs are unescaped
  • SQL queries not using prepared statements
  • Taint flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Add-on WooCommerce – MailPoet 3 Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Add-on WooCommerce – MailPoet 3 Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
12
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped12 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
save (includes\class-mpwa-admin-settings.php:296)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Add-on WooCommerce – MailPoet 3 Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionplugins_loadedadd-on-woocommerce-mailpoet.php:53
actionadmin_noticesadd-on-woocommerce-mailpoet.php:84
actionadmin_noticesadd-on-woocommerce-mailpoet.php:99
actionadmin_noticesadd-on-woocommerce-mailpoet.php:130
filterwoocommerce_get_settings_pagesadd-on-woocommerce-mailpoet.php:168
actionwoocommerce_checkout_update_order_metaadd-on-woocommerce-mailpoet.php:194
filterwoocommerce_settings_tabs_arrayincludes\class-mpwa-admin-settings.php:36
actionwoocommerce_checkout_update_order_reviewincludes\class-mpwa-frontend-fields.php:228
actionposts_selectionincludes\class-mpwa-frontend-fields.php:230
Maintenance & Trust

Add-on WooCommerce – MailPoet 3 Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedJan 30, 2025
PHP min version7.2
Downloads29K

Community Trust

Rating100/100
Number of ratings3
Active installs600
Developer Profile

Add-on WooCommerce – MailPoet 3 Developer Profile

Tikweb Management

4 plugins · 7K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Add-on WooCommerce – MailPoet 3

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/add-on-woocommerce-mailpoet/assets/css/style.css/wp-content/plugins/add-on-woocommerce-mailpoet/assets/js/script.js
Script Paths
/wp-content/plugins/add-on-woocommerce-mailpoet/assets/js/script.js
Version Parameters
add-on-woocommerce-mailpoet/assets/css/style.css?ver=add-on-woocommerce-mailpoet/assets/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
mpwa-checkbox-wrappermpwa-label-wrappermpwa-checkbox-inputmpwa-list-checkbox-wrappermpwa-list-label-wrappermpwa-list-checkbox-inputmailpoet-woocommerce-checkout-wrap
Data Attributes
data-mpwa-enable-subscriptiondata-mpwa-is-required
FAQ

Frequently Asked Questions about Add-on WooCommerce – MailPoet 3