Custom Forgot Password Mail Security & Risk Analysis

wordpress.org/plugins/custom-forgot-mail

Enables you to send custom forgot password emails to users.

300 active installs v1.4 PHP 7.4+ WP 6.0+ Updated Apr 16, 2025
custom-mailedit-mailforgot-passwordreset-passwordsend-mail
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Custom Forgot Password Mail Safe to Use in 2026?

Generally Safe

Score 100/100

Custom Forgot Password Mail has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11mo ago
Risk Assessment

The "custom-forgot-mail" v1.4 plugin exhibits an exceptionally strong security posture based on the provided static analysis and vulnerability history. The plugin demonstrates excellent adherence to secure coding practices by having zero AJAX handlers, REST API routes, shortcodes, or cron events exposed, resulting in a minimal attack surface with no unprotected entry points. The code signals further reinforce this positive assessment, with no dangerous functions, all SQL queries utilizing prepared statements, and all output properly escaped. Crucially, the presence of nonce and capability checks indicates a thoughtful approach to authorization and data integrity. The taint analysis shows no unsanitized paths, indicating no immediate risks from user-supplied data. The complete absence of known vulnerabilities, both historically and currently, is a significant strength. The plugin's development appears to prioritize security, with a clean codebase and no apparent historical issues. While the absence of certain features like external HTTP requests or file operations might limit its functionality, from a security perspective, this lack of potential vectors for attack is a clear advantage. Therefore, this plugin can be considered highly secure.

Vulnerabilities
None known

Custom Forgot Password Mail Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Forgot Password Mail Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped3 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
cfpm_overwrite (index.php:39)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Custom Forgot Password Mail Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_menuindex.php:32
filterretrieve_password_titleindex.php:105
filterretrieve_password_messageindex.php:124
filterwp_mail_content_typeindex.php:137
filterplugin_row_metaindex.php:160
actionadmin_enqueue_scriptsindex.php:173
Maintenance & Trust

Custom Forgot Password Mail Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 16, 2025
PHP min version7.4
Downloads11K

Community Trust

Rating96/100
Number of ratings4
Active installs300
Developer Profile

Custom Forgot Password Mail Developer Profile

Rajat Sharma

2 plugins · 300 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Forgot Password Mail

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-forgot-mail/assets/css/admin-style.css

HTML / DOM Fingerprints

CSS Classes
cfpm--noticee-notice__actionse-button--ctacta-secondarye-note
FAQ

Frequently Asked Questions about Custom Forgot Password Mail