Ban Subdomain Emails Security & Risk Analysis

wordpress.org/plugins/ban-subdomain-emails

Prevent people from registering with emails that contain a subdomain to help reduce spam.

10 active installs v1.0.0 PHP + WP 4.0+ Updated Unknown
akismetbanemailregistrationspam
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ban Subdomain Emails Safe to Use in 2026?

Generally Safe

Score 100/100

Ban Subdomain Emails has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "ban-subdomain-emails" plugin v1.0.0 exhibits a generally good security posture based on the provided static analysis. The plugin has a very small attack surface, with only one AJAX handler and no other common entry points like REST API routes, shortcodes, or cron events. Crucially, the single AJAX handler has a nonce check, and there are no unauthenticated entry points. The code also avoids dangerous functions, uses prepared statements for all its SQL queries, and does not perform file operations or external HTTP requests. The absence of any recorded vulnerability history further strengthens this positive outlook.

However, a significant concern arises from the lack of output escaping. 100% of the total outputs are not properly escaped, indicating a potential for Cross-Site Scripting (XSS) vulnerabilities. While no taint analysis flows with unsanitized paths were detected, and no direct SQL injection risks are apparent due to prepared statements, unescaped output can still allow attackers to inject malicious scripts that execute in the context of the logged-in user. The plugin also lacks capability checks, which, in conjunction with the AJAX handler, could theoretically lead to privilege escalation if not carefully managed within the AJAX handler's logic itself, although the presence of a nonce check mitigates immediate risk.

In conclusion, the plugin demonstrates good security fundamentals by minimizing attack surface and employing secure database practices. The primary weakness is the universal lack of output escaping, which presents a clear XSS risk. While the vulnerability history is clean, this particular oversight warrants attention. Addressing the output escaping issues should be a priority to fully secure the plugin.

Key Concerns

  • 100% of outputs are not properly escaped
  • Lack of capability checks on entry points
Vulnerabilities
None known

Ban Subdomain Emails Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Ban Subdomain Emails Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Ban Subdomain Emails Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_ban_subdomain_emailsban-subdomain-emails.php:49
WordPress Hooks 2
actionregister_postban-subdomain-emails.php:47
actioninitban-subdomain-emails.php:99
Maintenance & Trust

Ban Subdomain Emails Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Ban Subdomain Emails Developer Profile

jamiechong

3 plugins · 4K total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Ban Subdomain Emails

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
TODO don't consider country specific TLDs as subdomains such as .co.fr, .co.uk
REST Endpoints
/wp-json/
FAQ

Frequently Asked Questions about Ban Subdomain Emails