Custom New User Notification Security & Risk Analysis

wordpress.org/plugins/custom-new-user-notification

Custom New User Notification

80 active installs v1.2.0 PHP + WP 4.6+ Updated Jun 29, 2023
new-usernew-user-notificationregistration-emailuser-registrationwelcome-mail
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEApr 15, 2026
Safety Verdict

Is Custom New User Notification Safe to Use in 2026?

Use With Caution

Score 63/100

Custom New User Notification has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Apr 15, 2026Updated 2yr ago
Risk Assessment

The "custom-new-user-notification" plugin version 1.2.0 exhibits a generally strong security posture based on the provided static analysis. There are no identified direct entry points like AJAX handlers, REST API routes, or shortcodes that are exposed without authentication. The code signals also indicate a lack of dangerous functions and a complete absence of external HTTP requests or file operations. Furthermore, the plugin utilizes prepared statements for all SQL queries, which is an excellent practice for preventing SQL injection vulnerabilities.

However, a significant concern arises from the complete lack of output escaping. With 16 outputs identified and 0% properly escaped, this presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is displayed on the front-end or back-end of the WordPress site without proper sanitization and escaping could be exploited by attackers to inject malicious scripts. The absence of nonce checks and capability checks on any potential (though not explicitly identified) handlers also raises a flag, as these are crucial for ensuring that actions are authorized and intended.

The plugin's vulnerability history is clean, with no recorded CVEs, which is positive. This, combined with the static analysis showing no critical or high-severity taint flows, suggests that the current codebase might be relatively secure from certain classes of vulnerabilities. However, the lack of output escaping is a critical oversight that overshadows the other positive findings. A clean history does not guarantee future security, and the identified XSS vulnerability vector is a serious weakness that needs immediate attention.

Key Concerns

  • All identified outputs are unescaped
  • No nonce checks identified
  • No capability checks identified
Vulnerabilities
1 published

Custom New User Notification Security Vulnerabilities

CVEs by Year

1 CVE in 2026 · unpatched
2026
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2026-3551medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Custom New User Notification <= 1.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'User Mail Subject' Setting

Apr 15, 2026Unpatched
Version History

Custom New User Notification Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Custom New User Notification Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped16 total outputs
Attack Surface

Custom New User Notification Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_initadmin\includes.php:123
filterplugin_row_metacustom-new-user-notification.php:24
actionadmin_initcustom-new-user-notification.php:38
actionadmin_menucustom-new-user-notification.php:49
filterwp_mail_content_typecustom-new-user-notification.php:107
filterretrieve_password_messagecustom-new-user-notification.php:228
filterwp_mail_content_typecustom-new-user-notification.php:243
Maintenance & Trust

Custom New User Notification Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedJun 29, 2023
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs80
Developer Profile

Custom New User Notification Developer Profile

rafasashi

3 plugins · 1K total installs

83
trust score
Avg Security Score
75/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect Custom New User Notification

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-new-user-notification/css/style.css
Version Parameters
custom-new-user-notification/css/style.css?ver=

HTML / DOM Fingerprints

HTML Comments
DonateMinimum version requiredAdd donation linkAll the functions are in this file+21 more
Data Attributes
data-wplink-url-error
Shortcode Output
[cnun-display-name][cnun-user-login][cnun-user-email][cnun-reset-password-url]
FAQ

Frequently Asked Questions about Custom New User Notification