Disable Emails Security & Risk Analysis

wordpress.org/plugins/disable-emails

Stop WordPress from sending any emails. ANY!

30K active installs v1.8.3 PHP 5.6+ WP 5.5+ Updated Jan 13, 2026
block-emailsdisable-emails
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Disable Emails Safe to Use in 2026?

Generally Safe

Score 100/100

Disable Emails has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The "disable-emails" plugin v1.8.3 demonstrates a generally strong security posture based on the provided static analysis. The absence of any recorded CVEs, past or present, along with a lack of detected critical or high-severity taint flows, suggests a history of secure development and maintenance. The plugin also exhibits good practices such as the use of prepared statements for all SQL queries and a significant number of capability checks, indicating an effort to protect its functionalities from unauthorized access.

However, there are areas for improvement that introduce potential risks. The most notable concern is the "Output escaping" metric, where only 48% of outputs are properly escaped. This leaves a significant portion of dynamic output vulnerable to Cross-Site Scripting (XSS) attacks, especially if user-supplied data or data from external sources is incorporated into these unescaped outputs. While the "Attack Surface" appears minimal with no direct entry points like AJAX handlers, REST API routes, or shortcodes exposed without authentication, the unescaped output represents a latent vulnerability that could be exploited.

In conclusion, the plugin's lack of known vulnerabilities and its adherence to secure coding practices for SQL and authentication are significant strengths. The primary weakness lies in the insufficient output escaping, which is a common and serious security flaw. Addressing this weakness would greatly improve the overall security of the plugin.

Key Concerns

  • Significant portion of output not properly escaped
Vulnerabilities
None known

Disable Emails Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Disable Emails Release Timeline

v1.8.3Current
v1.8.2
v1.8.1
v1.8.0
v1.7.0
v1.6.3
v1.6.2
v1.6.1
v1.6.0
v1.5.0
v1.4.0
v1.3.0
v1.2.5
v1.2.4
v1.2.3
v1.2.2
v1.2.1
v1.2.0
v1.1.0
v1.0.0
Code Analysis
Analyzed Mar 16, 2026

Disable Emails Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
11 escaped
Nonce Checks
1
Capability Checks
8
File Operations
2
External Requests
0
Bundled Libraries
1

Bundled Libraries

PHPMailer

Output Escaping

48% escaped23 total outputs
Attack Surface

Disable Emails Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
actionadmin_noticesdisable-emails.php:51
actionadmin_initincludes\class.Plugin.php:46
actionadmin_menuincludes\class.Plugin.php:47
actionadmin_enqueue_scriptsincludes\class.Plugin.php:48
filterdashboard_glance_itemsincludes\class.Plugin.php:51
filterplugin_row_metaincludes\class.Plugin.php:52
actionadmin_bar_menuincludes\class.Plugin.php:61
actionadmin_print_stylesincludes\class.Plugin.php:62
actionadmin_noticesincludes\class.Plugin.php:66
actionadmin_noticesincludes\class.Plugin.php:70
actionadmin_bar_menuincludes\class.Plugin.php:71
actionadmin_print_stylesincludes\class.Plugin.php:72
filterbp_email_use_wp_mailincludes\class.Plugin.php:83
filterpre_option_dbem_rsvp_mail_send_methodincludes\class.Plugin.php:88
actionload-event_page_events-manager-optionsincludes\class.Plugin.php:89
actionadmin_noticesincludes\class.Requires.php:23
Maintenance & Trust

Disable Emails Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 13, 2026
PHP min version5.6
Downloads485K

Community Trust

Rating100/100
Number of ratings20
Active installs30K
Developer Profile

Disable Emails Developer Profile

webaware

13 plugins · 153K total installs

77
trust score
Avg Security Score
97/100
Avg Patch Time
1595 days
View full developer profile
Detection Fingerprints

How We Detect Disable Emails

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/disable-emails/static/css/admin.css/wp-content/plugins/disable-emails/static/js/settings.min.js/wp-content/plugins/disable-emails/static/js/settings.js
Script Paths
/wp-content/plugins/disable-emails/static/js/settings.min.js/wp-content/plugins/disable-emails/static/js/settings.js
Version Parameters
disable-emails/static/css/admin.css?ver=disable-emails/static/js/settings.min.js?ver=disable-emails/static/js/settings.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- disable-emails settings form --><!-- disable-emails settings form --
Data Attributes
data-mu-urldata-mu-activate-msgdata-mu-deactivate-msg
JS Globals
disable_emails_settings
FAQ

Frequently Asked Questions about Disable Emails