WPGraphQL Send Mail Security & Risk Analysis

wordpress.org/plugins/add-wpgraphql-send-mail

This plugin enables to send email via WPGraphQL.

500 active installs v1.2.0 PHP 7.0+ WP 5.0+ Updated Jan 27, 2021
decoupled-wordpressgraphqlheadless-wordpressmailwpgraphql
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPGraphQL Send Mail Safe to Use in 2026?

Generally Safe

Score 85/100

WPGraphQL Send Mail has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "add-wpgraphql-send-mail" plugin v1.2.0 exhibits a generally positive security posture based on the provided static analysis. The absence of known vulnerabilities in its history and the lack of dangerous functions are strong indicators of good development practices. Furthermore, the fact that all SQL queries utilize prepared statements is commendable, mitigating common SQL injection risks.

However, a significant concern arises from the output escaping analysis. With one total output and zero percent properly escaped, this presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data displayed to users without proper sanitization could be exploited by attackers. The plugin also lacks nonce and capability checks on its entry points, which, while currently few, could become a weakness if the attack surface expands in future versions. The current lack of taint flows and critical signals is encouraging, but the unescaped output remains a critical oversight.

In conclusion, while the plugin demonstrates a solid foundation in avoiding common vulnerabilities like SQL injection and has a clean vulnerability history, the glaring issue with output escaping significantly detracts from its security. Developers should prioritize addressing this XSS risk. The absence of comprehensive checks on entry points also warrants attention to prevent potential privilege escalation or unauthorized access if the plugin's functionality grows.

Key Concerns

  • Unescaped output detected
  • Missing capability checks on entry points
  • Missing nonce checks on entry points
Vulnerabilities
None known

WPGraphQL Send Mail Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WPGraphQL Send Mail Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

WPGraphQL Send Mail Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuwp-graphql-send-mail.php:18
actionadmin_initwp-graphql-send-mail.php:19
actiongraphql_register_typeswp-graphql-send-mail.php:125
Maintenance & Trust

WPGraphQL Send Mail Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedJan 27, 2021
PHP min version7.0
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs500
Developer Profile

WPGraphQL Send Mail Developer Profile

ash_hitch

3 plugins · 10K total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WPGraphQL Send Mail

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/wp-json/graphql-send-mail/v1
FAQ

Frequently Asked Questions about WPGraphQL Send Mail