Control WP Core Emails Security & Risk Analysis

wordpress.org/plugins/control-wp-core-emails

Control the emails sent by the WordPress auto-update process.

20 active installs v0.0.1 PHP + WP 4.0+ Updated Sep 21, 2016
core-updatesemails
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Control WP Core Emails Safe to Use in 2026?

Generally Safe

Score 85/100

Control WP Core Emails has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "control-wp-core-emails" plugin, in version 0.0.1, presents a generally strong security posture based on the provided static analysis. The absence of any identified dangerous functions, SQL queries not using prepared statements, unescaped output, file operations, external HTTP requests, or identifiable taint flows is highly encouraging. Furthermore, the plugin demonstrates robust security practices by implementing nonce and capability checks, which are crucial for preventing common WordPress vulnerabilities.

However, the static analysis also highlights a significant concern: the complete lack of any identified entry points such as AJAX handlers, REST API routes, shortcodes, or cron events. While this might suggest a minimal attack surface, it is unusual for a functional plugin. This could indicate that the plugin is either incomplete, non-functional, or its core functionality is not exposed through standard WordPress mechanisms. The vulnerability history also shows no recorded issues, which is positive, but given the lack of clear functionality exposed, it's difficult to definitively conclude its long-term security track record.

In conclusion, the code itself appears to be written with security in mind, adhering to best practices. The primary weakness lies in the apparent lack of exposed functionality, which makes it challenging to assess its real-world security risks and potential attack vectors. Users should proceed with caution, ensuring the plugin meets their functional needs without introducing unforeseen risks due to its limited apparent interaction points.

Key Concerns

  • No apparent entry points
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Control WP Core Emails Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Control WP Core Emails Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Control WP Core Emails Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionplugins_loadedcontrol-wp-core-emails.php:42
actionplugins_loadedcontrol-wp-core-emails.php:43
Maintenance & Trust

Control WP Core Emails Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedSep 21, 2016
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Control WP Core Emails Developer Profile

Andrew Norcross

18 plugins · 2K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Control WP Core Emails

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/control-wp-core-emails/lib/global.php/wp-content/plugins/control-wp-core-emails/lib/settings.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Control WP Core Emails