Auto Subscribe Users Security & Risk Analysis

wordpress.org/plugins/auto-subscribe-users

Automatically subscribe your users, so that they can be notified of any new content on the site.

10 active installs v0.0.6 PHP + WP 3.0.1+ Updated Jul 5, 2016
autoemailsubscribeuserswpmu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Auto Subscribe Users Safe to Use in 2026?

Generally Safe

Score 85/100

Auto Subscribe Users has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'auto-subscribe-users' plugin version 0.0.6 exhibits a strong security posture with no identified vulnerabilities or concerning code patterns. The complete absence of dangerous functions, SQL queries without prepared statements, unescaped output, file operations, external HTTP requests, and the lack of critical or high-severity taint flows all point to well-implemented security practices within the code. Furthermore, the plugin's vulnerability history is clean, with zero recorded CVEs, indicating a lack of past security weaknesses and a consistent security focus.

While the static analysis reports zero entry points, including AJAX handlers, REST API routes, shortcodes, and cron events, this is a potential area of concern. A plugin with no user-facing entry points might indicate it's not intended for active use or that its functionality is entirely backend-driven and not exposed through common WordPress interaction methods. If the plugin is intended to have any form of interaction, the absence of these entry points in the analysis could suggest they are not being properly detected or that there are fundamental design limitations.

In conclusion, the plugin appears technically sound from a code perspective, demonstrating a commitment to secure coding. However, the lack of any identified attack surface is unusual and warrants further investigation to ensure its intended functionality is properly exposed and secured if applicable. The current data presents a plugin that is secure in its current state but raises questions about its completeness or discoverability of its intended interaction points.

Vulnerabilities
None known

Auto Subscribe Users Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Auto Subscribe Users Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Auto Subscribe Users Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitauto-subscribe-users.php:51
actionwpmu_new_blogauto-subscribe-users.php:62
actionuser_registerauto-subscribe-users.php:64
Maintenance & Trust

Auto Subscribe Users Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJul 5, 2016
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Auto Subscribe Users Developer Profile

Harshit

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Auto Subscribe Users

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
data-user-id
FAQ

Frequently Asked Questions about Auto Subscribe Users