Email Address Encoder Security & Risk Analysis

wordpress.org/plugins/email-address-encoder

A lightweight plugin that protects email addresses from email-harvesting robots, by encoding them into decimal and hexadecimal entities.

100K active installs v1.0.24 PHP 5.3+ WP 2.0+ Updated Jan 20, 2025
blockcrawlerencryptionprotectionspam
91
A · Safe
CVEs total2
Unpatched0
Last CVEAug 26, 2024
Safety Verdict

Is Email Address Encoder Safe to Use in 2026?

Generally Safe

Score 91/100

Email Address Encoder has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Aug 26, 2024Updated 1yr ago
Risk Assessment

The "email-address-encoder" plugin v1.0.24 presents a mixed security posture. On the positive side, it demonstrates good practices by using prepared statements for all SQL queries and performing nonce and capability checks in a number of instances. The absence of file operations and external HTTP requests is also encouraging, and there are no reported critical or high severity vulnerabilities in its history. However, there are significant concerns, primarily stemming from its attack surface and output escaping. The presence of an unprotected AJAX handler represents a direct entry point for potential attacks. While taint analysis shows no current issues, the historical vulnerability data indicates past medium severity Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS) flaws. This suggests that input validation and output sanitization may have been inconsistent in previous versions, and even with partial output escaping in the current version, the remaining unescaped outputs present a risk for XSS attacks.

The plugin's vulnerability history, with two past medium severity CVEs related to CSRF and XSS, is a notable weakness. Although these are not currently unpatched, they signal a historical susceptibility to common web vulnerabilities. The fact that the last vulnerability was recent (2024-08-26) further emphasizes the need for vigilance. While the current version shows improvements in areas like SQL sanitization and a reduction in the overall attack surface, the unprotected AJAX handler and the percentage of unescaped outputs are significant risks that could be exploited. The absence of critical or high severity vulnerabilities in the past is positive, but the past issues and current code signals warrant careful consideration.

Key Concerns

  • Unprotected AJAX handler
  • Output escaping is not fully implemented
  • Past medium severity CVEs (CSRF, XSS)
Vulnerabilities
2

Email Address Encoder Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2024-43927medium · 4.3Cross-Site Request Forgery (CSRF)

Email Address Encoder <= 1.0.23 - Cross-Site Request Forgery via eae_clear_caches()

Aug 26, 2024 Patched in 1.0.24 (10d)
CVE-2023-48765medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Email Address Encoder 1.0.22 - Authenticated (Contributor+) Stored Cross-Site Scripting

Nov 28, 2023 Patched in 1.0.23 (56d)
Code Analysis
Analyzed Mar 16, 2026

Email Address Encoder Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
5 escaped
Nonce Checks
2
Capability Checks
3
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

63% escaped8 total outputs
Attack Surface
1 unprotected

Email Address Encoder Attack Surface

Entry Points2
Unprotected1

AJAX Handlers 1

authwp_ajax_eae_dismiss_noticeincludes\admin.php:63

Shortcodes 1

[encode] email-address-encoder.php:85
WordPress Hooks 18
filterwalker_nav_menu_start_elemail-address-encoder.php:70
actioninitemail-address-encoder.php:76
actionplugins_loadedincludes\admin.php:8
actionadmin_menuincludes\admin.php:13
actionadmin_initincludes\admin.php:18
filterplugin_action_linksincludes\admin.php:23
actionadmin_noticesincludes\admin.php:28
actionadmin_noticesincludes\admin.php:33
actionwp_enqueue_scriptsincludes\admin.php:38
actionadmin_enqueue_scriptsincludes\admin.php:43
actionload-settings_page_eaeincludes\admin.php:48
actionload-options.phpincludes\admin.php:53
actionwpincludes\admin.php:58
actionwp_footerincludes\admin.php:200
filterscript_loader_tagincludes\admin.php:212
filtershow_admin_barincludes\admin.php:440
filterdebug_bar_enableincludes\admin.php:443
filteruser_has_capincludes\admin.php:446
Maintenance & Trust

Email Address Encoder Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedJan 20, 2025
PHP min version5.3
Downloads1.6M

Community Trust

Rating84/100
Number of ratings160
Active installs100K
Developer Profile

Email Address Encoder Developer Profile

Till Krüss

5 plugins · 411K total installs

82
trust score
Avg Security Score
91/100
Avg Patch Time
33 days
View full developer profile
Detection Fingerprints

How We Detect Email Address Encoder

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/email-address-encoder/assets/js/admin.js/wp-content/plugins/email-address-encoder/assets/js/frontend.js
Script Paths
/wp-content/plugins/email-address-encoder/assets/js/admin.js/wp-content/plugins/email-address-encoder/assets/js/frontend.js
Version Parameters
email-address-encoder/assets/js/admin.js?ver=email-address-encoder/assets/js/frontend.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-eae-dismiss
JS Globals
eae_frontend
Shortcode Output
[encode]<a href="" class="
FAQ

Frequently Asked Questions about Email Address Encoder