
Comentario Via E-mail Security & Risk Analysis
wordpress.org/plugins/comentario-via-e-mailPermite que o usuário inscreva-se e um comentário e recebe atualizações via e-mail.
Is Comentario Via E-mail Safe to Use in 2026?
Generally Safe
Score 85/100Comentario Via E-mail has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "comentario-via-e-mail" v0.0.6 plugin exhibits a significant security risk primarily due to its complete lack of input sanitization and output escaping. While the plugin has a zero attack surface in terms of traditional entry points like AJAX, REST API, or shortcodes, the static analysis reveals a concerning pattern of insecure coding practices. The presence of 7 instances of the deprecated `create_function()` function is a strong indicator of potential code injection vulnerabilities, especially when combined with the fact that 0% of its 21 SQL queries use prepared statements. Furthermore, 0% of its 50 output operations are properly escaped, opening the door for cross-site scripting (XSS) attacks. The taint analysis showing 5 unsanitized flows, even without critical or high severity ratings, reinforces the widespread issue of unchecked data handling.
The plugin's vulnerability history is currently clean, with no recorded CVEs. This might suggest that the plugin has not been widely targeted or that its limited functionality has not yet been exploited. However, the inherent insecure coding practices identified in the static analysis are a ticking time bomb. The absence of any vulnerabilities in its history should not be mistaken for a secure codebase; rather, it signifies a high potential for undiscovered vulnerabilities. In conclusion, while the plugin appears to have a minimal attack surface and no documented vulnerabilities, the identified code quality issues, particularly the use of dangerous functions, raw SQL queries, and lack of output escaping, present a severe security risk that demands immediate attention.
Key Concerns
- SQL queries not using prepared statements
- Dangerous functions (create_function)
- Output escaping is not properly implemented
- Taint analysis shows unsanitized flows
Comentario Via E-mail Security Vulnerabilities
Comentario Via E-mail Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Comentario Via E-mail Attack Surface
WordPress Hooks 10
Maintenance & Trust
Comentario Via E-mail Maintenance & Trust
Maintenance Signals
Community Trust
Comentario Via E-mail Alternatives
Subscribe to Comments
subscribe-to-comments
Subscribe to Comments allows commenters on an entry to subscribe to e-mail notifications for subsequent comments.
Subscribe To Comments Checkbox
comments-subscribe-checkbox
This plugin will allow you to add subscribe notification checkbox to comments on your site.
Hostinger Reach – AI-Powered Email Marketing for WordPress
hostinger-reach
Launch and grow your email marketing effortlessly with Hostinger Reach. Collect contacts, sync subscribers, and send emails – all in one, AI powered.
Newsletter – Send awesome emails from WordPress
newsletter
An email marketing tool for your blog: subscription forms to create your lists with unlimited subscribers and newsletters.
Disqus Comment System
disqus-comment-system
Disqus is the web's most popular comment system. Use Disqus to increase engagement, retain readers, and grow your audience.
Comentario Via E-mail Developer Profile
1 plugin · 10 total installs
How We Detect Comentario Via E-mail
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
subscribe-to-commentssolo-subscribe-to-commentssolo-subscribe-errorsEste é o código que é inserido no formulário de comentárioEste é o texto que é exibido para os usuários que não está inscritoEste é o texto que é exibido para o autor do postEste é o texto que é exibido para os usuários que estão inscritos+16 moresg_subscribe_settings[name]sg_subscribe_settings[email]sg_subscribe_settings[clear_both]sg_subscribe_settings[not_subscribed_text]sg_subscribe_settings[subscribed_text]sg_subscribe_settings[author_text]+4 more