Email Auth – DKIM, SPF, DMARC, Bounce Address, From Address Security & Risk Analysis

wordpress.org/plugins/email-auth

Enable email authentication/validation for the default WordPress PHPMailer.

100 active installs v1.5.0 PHP 7.4+ WP 6.0+ Updated Jun 23, 2025
email
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Email Auth – DKIM, SPF, DMARC, Bounce Address, From Address Safe to Use in 2026?

Generally Safe

Score 100/100

Email Auth – DKIM, SPF, DMARC, Bounce Address, From Address has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9mo ago
Risk Assessment

The "email-auth" plugin version 1.5.0 exhibits a strong security posture based on the provided static analysis. The absence of any identified attack surface entry points, including AJAX handlers, REST API routes, shortcodes, and cron events, is a significant positive. Furthermore, the code signals are generally reassuring, with a high percentage of SQL queries utilizing prepared statements, robust output escaping, and a notable lack of dangerous functions or file operations. The single external HTTP request and the presence of capability checks are also good signs. The vulnerability history is completely clean, with no known CVEs, which suggests a history of secure development or diligent patching.

While the static analysis reports no critical or high severity taint flows, the lack of any taint analysis results (0 flows analyzed) means this area remains largely unverified. The absence of nonce checks on any entry points, coupled with only one identified capability check for the entire plugin, presents a potential concern. If any of the (currently zero) AJAX or REST API endpoints were ever introduced without proper authorization, the lack of nonces could be exploited. However, given the current state of zero entry points, this risk is theoretical rather than immediate.

In conclusion, "email-auth" v1.5.0 appears to be a well-developed and secure plugin, with excellent practices in place regarding SQL, output escaping, and avoiding dangerous functions. The clean vulnerability history further reinforces this. The primary area for potential improvement would be to ensure that any future additions to the attack surface include appropriate nonce checks and capability checks, and to perform more comprehensive taint analysis.

Key Concerns

  • No nonce checks on entry points
  • Limited capability checks detected
  • No taint analysis performed
Vulnerabilities
None known

Email Auth – DKIM, SPF, DMARC, Bounce Address, From Address Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Email Auth – DKIM, SPF, DMARC, Bounce Address, From Address Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
9 prepared
Unescaped Output
1
46 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

90% prepared10 total queries

Output Escaping

98% escaped47 total outputs
Attack Surface

Email Auth – DKIM, SPF, DMARC, Bounce Address, From Address Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actioninitemail-auth.php:39
actionadmin_enqueue_scriptsincludes\admin-interface.php:14
actionadmin_menuincludes\admin-interface.php:36
actionrest_api_initincludes\admin-interface.php:53
actionpre_set_transient_settings_errorsincludes\admin-interface.php:77
actionwp_mail_fromincludes\mailer-hooks.php:14
actionwp_mail_from_nameincludes\mailer-hooks.php:28
actionphpmailer_initincludes\mailer-hooks.php:42
Maintenance & Trust

Email Auth – DKIM, SPF, DMARC, Bounce Address, From Address Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJun 23, 2025
PHP min version7.4
Downloads2K

Community Trust

Rating100/100
Number of ratings4
Active installs100
Developer Profile

Email Auth – DKIM, SPF, DMARC, Bounce Address, From Address Developer Profile

Brandon Fowler

2 plugins · 200 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Email Auth – DKIM, SPF, DMARC, Bounce Address, From Address

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/email-auth/admin/css/common.css/wp-content/plugins/email-auth/admin/js/dkim.js
Version Parameters
email-auth/admin/css/common.css?ver=email-auth/admin/js/dkim.js?ver=

HTML / DOM Fingerprints

CSS Classes
eauth-wrapeauth-toceauth-email-inputeauth-address-inputeauth-radio-optionseauth-variableeauth-statuseauth-pre-output-static+3 more
Data Attributes
id="eauth-wrap"id="eauth-options"data-prefix=" - "data-variable="fromAddress"id="eauth-dkim-status"class="eauth-status"+8 more
JS Globals
eauthDkimApi
REST Endpoints
/wp-json/eauth/v1/dkim/keys
FAQ

Frequently Asked Questions about Email Auth – DKIM, SPF, DMARC, Bounce Address, From Address