Configure SMTP Security & Risk Analysis

wordpress.org/plugins/configure-smtp

Configure SMTP mailing in WordPress, including support for sending email via SSL/TLS (such as Gmail).

7K active installs v3.5 PHP + WP 5.5+ Updated Jul 22, 2024
coffee2codeemailgmailphpmailersmtp
92
A · Safe
CVEs total1
Unpatched0
Last CVEFeb 26, 2024
Safety Verdict

Is Configure SMTP Safe to Use in 2026?

Generally Safe

Score 92/100

Configure SMTP has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Feb 26, 2024Updated 1yr ago
Risk Assessment

The 'configure-smtp' plugin version 3.5 exhibits a generally good security posture, indicated by a lack of reported entry points without authentication and the exclusive use of prepared statements for SQL queries. The plugin also demonstrates strong practices in output escaping, with 93% of outputs being properly handled. The presence of nonce and capability checks further bolsters its security by mitigating common attack vectors.

However, a significant concern arises from the presence of the `unserialize` function, which, if not handled with extreme care and validation, can lead to remote code execution vulnerabilities. While the static analysis did not reveal any exploitable taint flows, this function remains a potential risk. The plugin's vulnerability history, while showing no currently unpatched vulnerabilities, does include a past medium-severity Cross-Site Scripting (XSS) vulnerability, suggesting a historical pattern of potential input sanitization issues that warrants continued vigilance.

In conclusion, 'configure-smtp' v3.5 has several strong security features, but the `unserialize` function represents a notable weakness. While recent activity shows no unpatched issues, the past XSS vulnerability is a reminder that thorough testing and code review are essential. The absence of a large attack surface is a positive, but the single dangerous function and past vulnerability history necessitate ongoing monitoring and prompt patching of any future issues.

Key Concerns

  • Use of dangerous function: unserialize
  • Past medium severity CVE
Vulnerabilities
1

Configure SMTP Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-27192medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Configure SMTP <= 3.1 - Reflected Cross-Site Scripting

Feb 26, 2024 Patched in 3.5 (732d)
Code Analysis
Analyzed Mar 16, 2026

Configure SMTP Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
4
57 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$plugins = unserialize( $r['body']['plugins'] );c2c-plugin.php:362

Output Escaping

93% escaped61 total outputs
Attack Surface

Configure SMTP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
actioninitc2c-plugin.php:188
actionadmin_initc2c-plugin.php:191
actionadmin_headc2c-plugin.php:192
filterplugin_row_metac2c-plugin.php:253
filterhttp_request_argsc2c-plugin.php:256
actionadmin_menuc2c-plugin.php:260
filtercontextual_helpc2c-plugin.php:263
actionadmin_enqueue_scriptsc2c-plugin.php:265
actionadmin_enqueue_scriptsconfigure-smtp.php:215
actionadmin_initconfigure-smtp.php:216
actionphpmailer_initconfigure-smtp.php:217
filterwp_mail_fromconfigure-smtp.php:218
filterwp_mail_from_nameconfigure-smtp.php:219
actionplugins_loadedconfigure-smtp.php:501
Maintenance & Trust

Configure SMTP Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedJul 22, 2024
PHP min version
Downloads369K

Community Trust

Rating98/100
Number of ratings45
Active installs7K
Developer Profile

Configure SMTP Developer Profile

Scott Reilly

59 plugins · 93K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
374 days
View full developer profile
Detection Fingerprints

How We Detect Configure SMTP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/configure-smtp/css/c2c-admin.css/wp-content/plugins/configure-smtp/js/c2c-admin.js
Script Paths
/wp-content/plugins/configure-smtp/js/c2c-admin.js
Version Parameters
configure-smtp/css/c2c-admin.css?ver=configure-smtp/js/c2c-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
c2c_configure_smtp_settings
HTML Comments
<!-- END c2c_ConfigureSMTP -->
JS Globals
c2c_configure_smtp_ajaxurlc2c_configure_smtp_admin_urlc2c_configure_smtp_noncec2c_configure_smtp_admin_nonce
FAQ

Frequently Asked Questions about Configure SMTP