CodingBunny Mail SMTP Security & Risk Analysis

wordpress.org/plugins/coding-bunny-mail-smtp

Configure an SMTP server to send emails from your WordPress site. Simple, lightweight, and secure.

10 active installs v1.0.3 PHP 8.0+ WP 6.0+ Updated Apr 9, 2026
emailmailphpmailersmtpwp_mail
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CodingBunny Mail SMTP Safe to Use in 2026?

Generally Safe

Score 100/100

CodingBunny Mail SMTP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The 'coding-bunny-mail-smtp' plugin version 1.0.2 exhibits a generally strong security posture with no known vulnerabilities and a clean history. The static analysis reveals a minimal attack surface with no identifiable entry points like AJAX handlers, REST API routes, shortcodes, or cron events. The code also demonstrates good practices by utilizing prepared statements for all SQL queries, performing nonce and capability checks, and avoiding risky file operations or external HTTP requests. However, a significant concern is the low percentage of properly escaped output (31%). This indicates a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data or dynamic content could be rendered directly in the browser without proper sanitization, allowing attackers to inject malicious scripts.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

CodingBunny Mail SMTP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

CodingBunny Mail SMTP Release Timeline

v1.0.3Current
v1.0.2
v1.0.1
v1.0.0
Code Analysis
Analyzed Mar 17, 2026

CodingBunny Mail SMTP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
47
21 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

31% escaped68 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
handle_test_email (coding-bunny-mail-smtp.php:135)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

CodingBunny Mail SMTP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menucoding-bunny-mail-smtp.php:87
actionadmin_initcoding-bunny-mail-smtp.php:88
actionadmin_initcoding-bunny-mail-smtp.php:89
actionphpmailer_initcoding-bunny-mail-smtp.php:90
actionadmin_enqueue_scriptscoding-bunny-mail-smtp.php:91
Maintenance & Trust

CodingBunny Mail SMTP Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedApr 9, 2026
PHP min version8.0
Downloads207

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

CodingBunny Mail SMTP Developer Profile

CodingBunny

5 plugins · 410 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CodingBunny Mail SMTP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/coding-bunny-mail-smtp/assets/css/cbsmtp-styles.css
Version Parameters
coding-bunny-mail-smtp/assets/css/cbsmtp-styles.css?ver=/coding-bunny-mail-smtp/assets/css/cbsmtp-styles.css?ver=

HTML / DOM Fingerprints

CSS Classes
cbsmtp-dashboardcbsmtp-headercbsmtp-header-leftcbsmtp-logocbsmtp-logo-fallbackcbsmtp-titlecbsmtp-versioncbsmtp-header-right+2 more
Data Attributes
aria-label
FAQ

Frequently Asked Questions about CodingBunny Mail SMTP