Email-Em Security & Risk Analysis

wordpress.org/plugins/email-em

Shares a current page's URL through email.

10 active installs v1.0.0 PHP + WP 4.5.0+ Updated Jun 26, 2016
emailemail-emprivateprivate-documentshare
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Email-Em Safe to Use in 2026?

Generally Safe

Score 85/100

Email-Em has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "email-em" v1.0.0 plugin exhibits a strong security posture based on the provided static analysis. The absence of any detected dangerous functions, raw SQL queries, improper output escaping, file operations, or external HTTP requests is highly commendable. The presence of nonce checks and the fact that all identified SQL queries utilize prepared statements are excellent security practices. Furthermore, the complete lack of any recorded vulnerabilities, including critical and high severity ones, suggests a mature development process or a lack of prior security scrutiny.

While the static analysis reveals no immediate security flaws, the primary concern is the extremely limited attack surface reported. With zero AJAX handlers, REST API routes, shortcodes, or cron events, it's possible the plugin has minimal functionality or its entry points are not being captured by the analysis. This lack of measurable attack surface, while seemingly positive, could also indicate incomplete analysis or a plugin that is not truly interacting with WordPress in a way that would expose vulnerabilities. The total absence of taint analysis flows is also unusual and could mean either the code is extremely simple or the analysis tool had limitations.

Overall, the plugin appears to be developed with security in mind, adhering to best practices where it does interact with the WordPress core. However, the minimal attack surface and lack of taint analysis results warrant a cautious approach. The plugin's history of zero vulnerabilities is a significant strength, but it's important to consider if this is due to strong security or limited exposure. Further investigation into the plugin's actual functionality and a more comprehensive analysis of its code pathways would be beneficial.

Vulnerabilities
None known

Email-Em Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Email-Em Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Email-Em Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Email-Em Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterthe_contentemail-em.php:10
Maintenance & Trust

Email-Em Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJun 26, 2016
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Email-Em Developer Profile

Bimal Poudel

13 plugins · 840 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Email-Em

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="email-em"action="?"placeholder="email address"value="Email-Em this URL"
Shortcode Output
<form name="email-em" method="post" action="?" autocomplete="off" style="padding: 20px; border: 3px dashed gray;"> <input type="email" name="sendto" value="" placeholder="email address"> <input type="submit" value="Email-Em this URL"> </form>
FAQ

Frequently Asked Questions about Email-Em