
Bulk Mail Send Security & Risk Analysis
wordpress.org/plugins/bulk-mail-sendSend bulk emails to registered users and orders.
Is Bulk Mail Send Safe to Use in 2026?
Generally Safe
Score 100/100Bulk Mail Send has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
Based on the static analysis and vulnerability history provided, the "bulk-mail-send" plugin v1.13 exhibits a strong security posture in several key areas. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with potential for unauthorized access significantly limits the plugin's attack surface. Furthermore, the analysis indicates no dangerous functions used, no file operations, and no external HTTP requests, all of which are positive indicators of secure coding practices. The fact that all identified output is properly escaped also mitigates the risk of cross-site scripting vulnerabilities.
However, the analysis does highlight a critical area of concern: the single SQL query found is not using prepared statements. This represents a significant risk, as it leaves the plugin vulnerable to SQL injection attacks if any user-supplied data is incorporated into this query. While the taint analysis found no issues, this is likely due to the limited scope or absence of taintable flows in the analyzed code, and does not negate the inherent risk of raw SQL queries. The plugin also lacks any evident nonce or capability checks, which, while not directly flagged as vulnerabilities in this specific analysis, are fundamental security mechanisms that should ideally be present, especially if any user interaction is involved with the plugin's functionality.
Given the complete absence of any historical vulnerabilities, the "bulk-mail-send" plugin appears to have a good track record. This, combined with the well-managed attack surface and output escaping, is a strength. Nevertheless, the unescaped SQL query is a tangible and serious weakness that requires immediate attention. A balanced conclusion would be that the plugin has implemented several good security practices, but the presence of a raw SQL query introduces a critical vulnerability that overshadows its other strengths and significantly lowers its overall security score.
Key Concerns
- Raw SQL query without prepared statements
Bulk Mail Send Security Vulnerabilities
Bulk Mail Send Release Timeline
Bulk Mail Send Code Analysis
SQL Query Safety
Bulk Mail Send Attack Surface
WordPress Hooks 1
Maintenance & Trust
Bulk Mail Send Maintenance & Trust
Maintenance Signals
Community Trust
Bulk Mail Send Alternatives
Export and Import Users and Customers
users-customers-import-export-for-wp-woocommerce
Import and export WordPress users and WooCommerce customers using CSV. Migrate to your new site without any data loss.
Send Users Email – Email Subscribers, Email Marketing Newsletter
send-users-email
Send Users Email provides a way to send email to all system users either by selecting individual users or user roles.
Fraud Prevention For WooCommerce and EDD
woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers
It will Prevent fake orders and Blacklist fraud customers of your store.
Post Notification by Email
notify-users-e-mail
Send an email to all users whenever a new post is published on your WordPress.
Blacklist Manager – WooCommerce Anti-Fraud & Checkout Verification & Spam Prevention
wc-blacklist-manager
Anti-fraud, checkout verification and spam prevention plugin for WooCommerce and WordPress forms.
Bulk Mail Send Developer Profile
54 plugins · 56K total installs
How We Detect Bulk Mail Send
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/bulk-mail-send/css/style.css/wp-content/plugins/bulk-mail-send/js/script.js/wp-content/plugins/bulk-mail-send/js/script.jsbulk-mail-send/css/style.css?ver=bulk-mail-send/js/script.js?ver=HTML / DOM Fingerprints
Copyright (c) 2020- Katsushi Kawamori (email : dodesyoswift312@gmail.com)This program is free software; you can redistribute it and/or modifyit under the terms of the GNU General Public License as published bythe Free Software Foundation; version 2 of the License.+7 more