Email Media Import Security & Risk Analysis

wordpress.org/plugins/email-media-import

wordpress-email-media-import plugin allows users to upload images into Wordpress Media Gallery by sending emails into specific email address.

10 active installs v0.7 PHP + WP 4.6+ Updated Oct 24, 2016
emailmailgunmedia
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Email Media Import Safe to Use in 2026?

Generally Safe

Score 85/100

Email Media Import has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "email-media-import" plugin v0.7 demonstrates a generally good security posture with no known vulnerabilities or critical security signals detected in static analysis. The plugin effectively utilizes prepared statements for all SQL queries and has a single capability check, indicating an effort towards secure coding practices. The absence of external HTTP requests and bundled libraries further reduces the potential attack surface.

However, a significant concern arises from the low percentage of properly escaped output (38%). This suggests that user-supplied data or dynamically generated content might be rendered directly to the browser without adequate sanitization, creating a potential risk for cross-site scripting (XSS) vulnerabilities. Additionally, while the attack surface is small with only one entry point (a shortcode), the lack of nonce checks on this shortcode, if it handles user input, presents a potential for cross-site request forgery (CSRF) attacks. The absence of taint analysis flows analyzed is noted but doesn't provide a definitive security signal either way.

In conclusion, the plugin benefits from strong practices like prepared SQL statements and a limited attack surface. The primary weakness lies in the insufficient output escaping, which requires immediate attention to mitigate XSS risks. The absence of nonce checks on the shortcode should also be addressed. The clean vulnerability history is positive, but the code-level findings necessitate further review and remediation.

Key Concerns

  • Insufficient output escaping detected
  • Missing nonce checks on shortcode
Vulnerabilities
None known

Email Media Import Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Email Media Import Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
5 escaped
Nonce Checks
0
Capability Checks
1
File Operations
4
External Requests
0
Bundled Libraries
0

Output Escaping

38% escaped13 total outputs
Attack Surface

Email Media Import Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[email_media_import] email-media-import.php:130
WordPress Hooks 2
actionadmin_menusettings.php:9
actionadmin_initsettings.php:10
Maintenance & Trust

Email Media Import Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedOct 24, 2016
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Email Media Import Developer Profile

metatavu

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Email Media Import

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[email_media_import]
FAQ

Frequently Asked Questions about Email Media Import