Advanced Email Domain Restriction Security & Risk Analysis

wordpress.org/plugins/advanced-email-domain-restriction

Restrict user registrations to specific domains, TLDs, or email addresses. Includes CSV import/export and WooCommerce support.

40 active installs v1.3.0 PHP 7.4+ WP 6.3+ Updated Feb 22, 2026
domainemailregistrationrestrictionwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Advanced Email Domain Restriction Safe to Use in 2026?

Generally Safe

Score 100/100

Advanced Email Domain Restriction has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The advanced-email-domain-restriction plugin v1.3.0 exhibits a generally strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a minimal attack surface. The code further demonstrates good practices with 100% of SQL queries utilizing prepared statements, a high percentage of properly escaped output, and the presence of nonce and capability checks. The lack of known CVEs and past vulnerabilities suggests a history of stable and secure development.

However, there are two areas of potential concern. The taint analysis reveals two flows with unsanitized paths. While these are not classified as critical or high severity, unsanitized paths can be a precursor to vulnerabilities if input is not properly validated or sanitized before use in sensitive operations. Additionally, the plugin performs two file operations. Without further context on these operations, it's impossible to definitively assess their security, but they represent potential entry points for file-related vulnerabilities if not handled with extreme care.

In conclusion, the plugin is built on a solid foundation of secure coding practices, with a minimal attack surface and good use of WordPress security features. The primary, albeit low-level, risk stems from the identified unsanitized paths. The file operations warrant closer inspection if more detail were available. The absence of historical vulnerabilities is a positive indicator, suggesting a mature and secure codebase.

Key Concerns

  • Flows with unsanitized paths detected
  • File operations present
Vulnerabilities
None known

Advanced Email Domain Restriction Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Advanced Email Domain Restriction Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
16 escaped
Nonce Checks
1
Capability Checks
2
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

94% escaped17 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
aedr_validate_settings (includes\class-aedr-admin.php:401)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Advanced Email Domain Restriction Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actionadmin_menuincludes\class-aedr-admin.php:55
actionadmin_initincludes\class-aedr-admin.php:56
actionadmin_enqueue_scriptsincludes\class-aedr-admin.php:57
actionadmin_post_aedr_export_csvincludes\class-aedr-admin.php:58
filterregistration_errorsincludes\class-aedr-admin.php:83
filterwoocommerce_registration_errorsincludes\class-aedr-admin.php:84
filterwp_mu_validate_user_signupincludes\class-aedr-admin.php:85
filterwpcf7_validate_emailincludes\class-aedr-admin.php:88
filterwpcf7_validate_email*includes\class-aedr-admin.php:89
actionwpforms_process_validate_emailincludes\class-aedr-admin.php:92
actionelementor_pro/forms/validationincludes\class-aedr-admin.php:95
Maintenance & Trust

Advanced Email Domain Restriction Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 22, 2026
PHP min version7.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

Advanced Email Domain Restriction Developer Profile

Md Siddiqur Rahman

1 plugin · 40 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Advanced Email Domain Restriction

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/advanced-email-domain-restriction/assets/css/admin.css/wp-content/plugins/advanced-email-domain-restriction/assets/js/admin.js/wp-content/plugins/advanced-email-domain-restriction/assets/js/multiselect.min.js
Script Paths
/wp-content/plugins/advanced-email-domain-restriction/assets/js/admin.js/wp-content/plugins/advanced-email-domain-restriction/assets/js/multiselect.min.js
Version Parameters
advanced-email-domain-restriction/assets/css/admin.css?ver=advanced-email-domain-restriction/assets/js/admin.js?ver=advanced-email-domain-restriction/assets/js/multiselect.min.js?ver=

HTML / DOM Fingerprints

CSS Classes
aedr-form-tableaedr-remove-entryaedr-actionsaedr-add-entryaedr-bulk-actionsaedr-bulk-uploadaedr-bulk-export
Data Attributes
data-field
JS Globals
aedr_admin_options
FAQ

Frequently Asked Questions about Advanced Email Domain Restriction