Elastic Email Subscribe Form Security & Risk Analysis

wordpress.org/plugins/elastic-email-subscribe-form

Elastic Email Subscribe Form allows you to create and manage a beautiful widget for your WordPress blog or website. This easy to use, beautiful and po …

100 active installs v1.2.2 PHP 5.6+ WP 4.1+ Updated Oct 27, 2021
email-marketingnewsletterrecaptchasubscriptiontags-elastic-email
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEJun 5, 2025
Safety Verdict

Is Elastic Email Subscribe Form Safe to Use in 2026?

Use With Caution

Score 63/100

Elastic Email Subscribe Form has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Jun 5, 2025Updated 4yr ago
Risk Assessment

The 'elastic-email-subscribe-form' v1.2.2 plugin exhibits a concerning security posture, primarily due to a significant number of unprotected entry points. The static analysis reveals 4 AJAX handlers, all of which lack authentication checks, presenting a wide attack surface for unauthenticated users. This is further exacerbated by a complete absence of nonce checks and capability checks, making it highly susceptible to Cross-Site Request Forgery (CSRF) and unauthorized actions. While the plugin avoids dangerous functions and has some SQL queries using prepared statements, the poor output escaping (only 29% properly escaped) suggests a risk of Cross-Site Scripting (XSS) vulnerabilities. The single taint analysis flow with unsanitized paths, though not critical or high severity, indicates potential for path traversal or similar issues if exploited. The vulnerability history, including a past medium severity vulnerability attributed to missing authorization, reinforces the identified weaknesses. Although the plugin has no critical or high severity known vulnerabilities and does not bundle fundamentally outdated libraries, the prevalence of missing authorization in its history and the current code analysis raises significant concerns for its overall security.

Key Concerns

  • Unprotected AJAX handlers
  • Missing nonce checks
  • Missing capability checks
  • Low percentage of properly escaped output
  • Flow with unsanitized paths
  • Unpatched medium severity CVE
Vulnerabilities
1

Elastic Email Subscribe Form Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-28985medium · 4.3Missing Authorization

Elastic Email Subscribe Form <= 1.2.2 - Missing Authorization

Jun 5, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Elastic Email Subscribe Form Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
2 prepared
Unescaped Output
100
40 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
1
Bundled Libraries
1

Bundled Libraries

jQuery3.3.1

SQL Query Safety

50% prepared4 total queries

Output Escaping

29% escaped140 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<t-eesf_reports> (template\t-eesf_reports.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
4 unprotected

Elastic Email Subscribe Form Attack Surface

Entry Points4
Unprotected4

AJAX Handlers 4

authwp_ajax_subscribe_send_testelasticemailsubscribe.php:70
authwp_ajax_clean_error_logelasticemailsubscribe.php:184
authwp_ajax_elasticEmailContactAddsecurity\eesf_security.php:6
noprivwp_ajax_elasticEmailContactAddsecurity\eesf_security.php:7
WordPress Hooks 13
actioninitclass\eesf_admin.php:29
actioninitclass\eesf_admin.php:30
actionadmin_menuclass\eesf_admin.php:31
actionadmin_initclass\eesf_admin.php:32
actionadmin_initclass\eesf_admin.php:33
actionplugins_loadedclass\eesf_admin.php:34
actiondelListsclass\eesf_admin.php:37
actionadmin_enqueue_scriptsclass\eesf_admin.php:48
actionadmin_noticesclass\eesf_mail.php:14
filterretrieve_password_messagedefaults\function.reset_pass.php:21
actionadmin_noticeselasticemailsubscribe.php:20
actionupgrader_process_completeelasticemailsubscribe.php:86
actionwidgets_initelasticemailsubscribe.php:196
Maintenance & Trust

Elastic Email Subscribe Form Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedOct 27, 2021
PHP min version5.6
Downloads19K

Community Trust

Rating90/100
Number of ratings4
Active installs100
Developer Profile

Elastic Email Subscribe Form Developer Profile

Elastic Email

2 plugins · 10K total installs

66
trust score
Avg Security Score
81/100
Avg Patch Time
116 days
View full developer profile
Detection Fingerprints

How We Detect Elastic Email Subscribe Form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/elastic-email-subscribe-form/css/eesf-widget-style.css/wp-content/plugins/elastic-email-subscribe-form/js/eesf-widget-script.js
Script Paths
/wp-content/plugins/elastic-email-subscribe-form/js/eesf-widget-script.js
Version Parameters
elastic-email-subscribe-form/css/eesf-widget-style.css?ver=elastic-email-subscribe-form/js/eesf-widget-script.js?ver=

HTML / DOM Fingerprints

CSS Classes
EESW_Widget
Data Attributes
data-widget-id
JS Globals
EESWF
FAQ

Frequently Asked Questions about Elastic Email Subscribe Form