BCC Everything Security & Risk Analysis

wordpress.org/plugins/bcc-everything

Blind copy (Bcc) outgoing emails to additional recipients.

300 active installs v1.1.2 PHP + WP 2.2+ Updated Oct 11, 2014
bccblind-copyemailmailwp_mail
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is BCC Everything Safe to Use in 2026?

Generally Safe

Score 85/100

BCC Everything has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'bcc-everything' plugin v1.1.2 demonstrates a generally good security posture based on the provided static analysis and vulnerability history. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the code signals indicate no dangerous functions, file operations, external HTTP requests, or bundled libraries, which are all positive indicators. The fact that all SQL queries utilize prepared statements is a strong practice for preventing SQL injection vulnerabilities. The plugin also shows no recorded vulnerabilities, including CVEs, which suggests a history of secure development or diligent patching by its maintainers.

However, a significant concern arises from the output escaping. With 100% of the observed outputs being unescaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data displayed to users, if not properly escaped, could be exploited to inject malicious scripts. Additionally, the absence of nonce checks and capability checks across all entry points (even though there are none) implies that if any were introduced in future versions or if the attack surface expands, they would be unprotected. This highlights a potential gap in security awareness or implementation for handling user-submitted data that is rendered.

In conclusion, while the plugin benefits from a minimal attack surface and secure database practices, the critical lack of output escaping represents a substantial risk. The vulnerability history is reassuring, but the static analysis reveals a clear area for improvement. Prioritizing output sanitization is crucial to mitigate the risk of XSS attacks and ensure a more robust security profile for this plugin.

Key Concerns

  • Unescaped output identified
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

BCC Everything Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

BCC Everything Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

BCC Everything Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterwp_mailbcc-everything.php:16
actionadmin_initbcc-everything.php:48
Maintenance & Trust

BCC Everything Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedOct 11, 2014
PHP min version
Downloads4K

Community Trust

Rating90/100
Number of ratings2
Active installs300
Developer Profile

BCC Everything Developer Profile

ffischer

1 plugin · 300 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect BCC Everything

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about BCC Everything