eMail by SMTP Security & Risk Analysis

wordpress.org/plugins/email-by-smtp

eMail by SMTP gives you the possibility to change the standard wordpress eMail sending from phpMail to SMTP transmitting.

10 active installs v1.0 PHP 5.6+ WP 4.9+ Updated May 20, 2021
emailemail-by-smtpemail-configurationemail-sendingsmtp
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is eMail by SMTP Safe to Use in 2026?

Generally Safe

Score 85/100

eMail by SMTP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The email-by-smtp plugin v1.0 appears to have a very limited attack surface based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces the potential entry points for attackers. Furthermore, the absence of dangerous functions, raw SQL queries, file operations, external HTTP requests, and the proper use of prepared statements for all SQL queries are strong indicators of good security practices. The plugin also does not seem to bundle any external libraries, removing a common vector for vulnerability exploitation.

However, a significant concern arises from the low percentage of properly escaped output (32%). This indicates that user-supplied data or dynamically generated content might be rendered without sufficient sanitization, potentially exposing the site to Cross-Site Scripting (XSS) vulnerabilities. The lack of nonce and capability checks, while potentially mitigated by the extremely small attack surface, is a general weakness that could become a risk if new entry points are added in future versions or if an attacker finds a way to trigger code execution indirectly. The plugin's vulnerability history is clean, with no recorded CVEs, suggesting a history of secure development or a lack of past scrutiny, but the unescaped output remains a tangible risk.

In conclusion, while the plugin exhibits strong security foundations by minimizing its attack surface and adhering to safe coding practices for database interactions and external communications, the insufficient output escaping presents a notable risk. This needs to be addressed to prevent potential XSS attacks. The absence of vulnerability history is positive but does not negate the identified code-level weaknesses.

Key Concerns

  • Low percentage of properly escaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

eMail by SMTP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

eMail by SMTP Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

eMail by SMTP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
26
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

32% escaped38 total outputs
Attack Surface

eMail by SMTP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionphpmailer_initemailbysmtp.php:19
actionwp_loadedemailbysmtp.php:141
actionadmin_menuemailbysmtp.php:158
actionadmin_initemailbysmtp.php:170
Maintenance & Trust

eMail by SMTP Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedMay 20, 2021
PHP min version5.6
Downloads925

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

eMail by SMTP Developer Profile

ownwp

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect eMail by SMTP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
ownwp_ebs_plugin
FAQ

Frequently Asked Questions about eMail by SMTP