
Email-Em Security & Risk Analysis
wordpress.org/plugins/email-emShares a current page's URL through email.
Is Email-Em Safe to Use in 2026?
Generally Safe
Score 85/100Email-Em has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "email-em" v1.0.0 plugin exhibits a strong security posture based on the provided static analysis. The absence of any detected dangerous functions, raw SQL queries, improper output escaping, file operations, or external HTTP requests is highly commendable. The presence of nonce checks and the fact that all identified SQL queries utilize prepared statements are excellent security practices. Furthermore, the complete lack of any recorded vulnerabilities, including critical and high severity ones, suggests a mature development process or a lack of prior security scrutiny.
While the static analysis reveals no immediate security flaws, the primary concern is the extremely limited attack surface reported. With zero AJAX handlers, REST API routes, shortcodes, or cron events, it's possible the plugin has minimal functionality or its entry points are not being captured by the analysis. This lack of measurable attack surface, while seemingly positive, could also indicate incomplete analysis or a plugin that is not truly interacting with WordPress in a way that would expose vulnerabilities. The total absence of taint analysis flows is also unusual and could mean either the code is extremely simple or the analysis tool had limitations.
Overall, the plugin appears to be developed with security in mind, adhering to best practices where it does interact with the WordPress core. However, the minimal attack surface and lack of taint analysis results warrant a cautious approach. The plugin's history of zero vulnerabilities is a significant strength, but it's important to consider if this is due to strong security or limited exposure. Further investigation into the plugin's actual functionality and a more comprehensive analysis of its code pathways would be beneficial.
Email-Em Security Vulnerabilities
Email-Em Release Timeline
Email-Em Code Analysis
Output Escaping
Email-Em Attack Surface
WordPress Hooks 1
Maintenance & Trust
Email-Em Maintenance & Trust
Maintenance Signals
Community Trust
Email-Em Alternatives
WPO365 | SEAMLESS WORDPRESS + MICROSOFT INTEGRATION (WPO365 | LOGIN)
wpo365-login
WordPress + Microsoft Entra | Ext. ID | B2C | M365 Integration for your Digital Workplace. For SSO, Mail, Roles, Access, Profiles, SharePoint, PowerBI …
Admin SSL
admin-ssl-secure-admin
Admin SSL secures login page, admin area, posts, pages - whatever you want - using Private SSL.
Private Post Share
sharable-password-protected-posts
Share password protected posts via secret URLs
Sharedaddy
sharedaddy
Future upgrades to Sharedaddy plugin will only be available in Jetpack.
Share by Email
share-by-email
Lightweight plugin that gives your readers an easy way to share your content via their email client. A classic Share via Email link.
Email-Em Developer Profile
13 plugins · 840 total installs
How We Detect Email-Em
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
name="email-em"action="?"placeholder="email address"value="Email-Em this URL"<form name="email-em" method="post" action="?" autocomplete="off" style="padding: 20px; border: 3px dashed gray;">
<input type="email" name="sendto" value="" placeholder="email address">
<input type="submit" value="Email-Em this URL">
</form>