Bulk Mail Send Security & Risk Analysis

wordpress.org/plugins/bulk-mail-send

Send bulk emails to registered users and orders.

100 active installs v1.13 PHP 8.0+ WP 4.7+ Updated Nov 25, 2025
customersmailordersusers
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Bulk Mail Send Safe to Use in 2026?

Generally Safe

Score 100/100

Bulk Mail Send has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

Based on the static analysis and vulnerability history provided, the "bulk-mail-send" plugin v1.13 exhibits a strong security posture in several key areas. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with potential for unauthorized access significantly limits the plugin's attack surface. Furthermore, the analysis indicates no dangerous functions used, no file operations, and no external HTTP requests, all of which are positive indicators of secure coding practices. The fact that all identified output is properly escaped also mitigates the risk of cross-site scripting vulnerabilities.

However, the analysis does highlight a critical area of concern: the single SQL query found is not using prepared statements. This represents a significant risk, as it leaves the plugin vulnerable to SQL injection attacks if any user-supplied data is incorporated into this query. While the taint analysis found no issues, this is likely due to the limited scope or absence of taintable flows in the analyzed code, and does not negate the inherent risk of raw SQL queries. The plugin also lacks any evident nonce or capability checks, which, while not directly flagged as vulnerabilities in this specific analysis, are fundamental security mechanisms that should ideally be present, especially if any user interaction is involved with the plugin's functionality.

Given the complete absence of any historical vulnerabilities, the "bulk-mail-send" plugin appears to have a good track record. This, combined with the well-managed attack surface and output escaping, is a strength. Nevertheless, the unescaped SQL query is a tangible and serious weakness that requires immediate attention. A balanced conclusion would be that the plugin has implemented several good security practices, but the presence of a raw SQL query introduces a critical vulnerability that overshadows its other strengths and significantly lowers its overall security score.

Key Concerns

  • Raw SQL query without prepared statements
Vulnerabilities
None known

Bulk Mail Send Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Bulk Mail Send Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Bulk Mail Send Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries
Attack Surface

Bulk Mail Send Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionbefore_woocommerce_initbulkmailsend.php:41
Maintenance & Trust

Bulk Mail Send Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedNov 25, 2025
PHP min version8.0
Downloads7K

Community Trust

Rating60/100
Number of ratings2
Active installs100
Developer Profile

Bulk Mail Send Developer Profile

Katsushi Kawamori

54 plugins · 56K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
178 days
View full developer profile
Detection Fingerprints

How We Detect Bulk Mail Send

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/bulk-mail-send/css/style.css/wp-content/plugins/bulk-mail-send/js/script.js
Script Paths
/wp-content/plugins/bulk-mail-send/js/script.js
Version Parameters
bulk-mail-send/css/style.css?ver=bulk-mail-send/js/script.js?ver=

HTML / DOM Fingerprints

HTML Comments
Copyright (c) 2020- Katsushi Kawamori (email : dodesyoswift312@gmail.com)This program is free software; you can redistribute it and/or modifyit under the terms of the GNU General Public License as published bythe Free Software Foundation; version 2 of the License.+7 more
FAQ

Frequently Asked Questions about Bulk Mail Send