Draft Notify Security & Risk Analysis

wordpress.org/plugins/draft-notify

This plugin is designed to send an email notification whenever a draft is saved.

100 active installs v1.5 PHP + WP 3.0.1+ Updated Apr 5, 2018
authorsdraft-notificationdraftsemail-notification
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEDec 21, 2025
Safety Verdict

Is Draft Notify Safe to Use in 2026?

Use With Caution

Score 63/100

Draft Notify has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Dec 21, 2025Updated 8yr ago
Risk Assessment

The 'draft-notify' v1.5 plugin presents a mixed security posture. On the positive side, the static analysis reveals a very limited attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, there are no critical or high severity taint flows identified, and no file operations or external HTTP requests, which are good indicators of secure coding practices in those areas. However, significant concerns arise from the SQL query handling and output escaping. All three SQL queries are executed without prepared statements, posing a risk of SQL injection vulnerabilities. Additionally, a large majority of output (87%) is not properly escaped, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities.

The vulnerability history is a major red flag, with one medium severity CVE for Cross-Site Scripting that remains unpatched. This indicates a recurring issue with input sanitization and output escaping, mirroring the findings in the static code analysis. The fact that this vulnerability is recent (2025) and unpatched is particularly concerning. While the plugin has a small attack surface, the identified vulnerabilities in SQL handling and output escaping, combined with a known unpatched XSS vulnerability, significantly elevate the overall risk. Users should exercise caution and consider alternatives or ensure this specific vulnerability is addressed before deployment.

Key Concerns

  • Unpatched CVE (Medium Severity)
  • Raw SQL queries without prepared statements
  • High percentage of unescaped output
  • No nonce checks
  • No capability checks
Vulnerabilities
1 published

Draft Notify Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-67627medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Draft Notify <= 1.5 - Authenticated (Administrator+) Stored Cross-Site Scripting

Dec 21, 2025Unpatched
Version History

Draft Notify Release Timeline

vV1.51 CVE
vV1.01 CVE
Code Analysis
Analyzed Mar 16, 2026

Draft Notify Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
14
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries

Output Escaping

13% escaped16 total outputs
Attack Surface

Draft Notify Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionsave_postdraft-notify.php:195
actionadmin_menudraft-notify.php:207
actionadmin_initdraft-notify.php:211
Maintenance & Trust

Draft Notify Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedApr 5, 2018
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Draft Notify Developer Profile

TouchOfTech

1 plugin · 100 total installs

68
trust score
Avg Security Score
63/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Draft Notify

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Draft Notify