Email Mentioned Security & Risk Analysis

wordpress.org/plugins/email-mentioned

Email Mentioned is a lightweight customizable -no coding needed- plugin to send an email to each user mentioned in comments.

10 active installs v1.11 PHP + WP 4.1.5+ Updated Unknown
commentsemailmentionmentionsreferencia
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Email Mentioned Safe to Use in 2026?

Generally Safe

Score 100/100

Email Mentioned has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "email-mentioned" plugin v1.11 exhibits a generally strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points significantly limits the potential attack surface. Furthermore, the plugin demonstrates good development practices by exclusively using prepared statements for its single SQL query, eliminating the risk of SQL injection through this vector. There are also no recorded vulnerabilities (CVEs) for this plugin, which is a positive indicator of its past security.

However, a significant concern arises from the output escaping. With only 25% of its outputs properly escaped, there is a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data displayed to users that originates from user input or other untrusted sources, and is not properly escaped, could be exploited to inject malicious scripts.

While the plugin has no file operations or external HTTP requests, and the taint analysis reveals no unsanitized flows, the low percentage of properly escaped outputs remains a critical weakness. The single capability check, while present, doesn't mitigate the XSS risk if the underlying data being output is not escaped. In conclusion, the plugin has a minimal attack surface and no known historical vulnerabilities, but the poor output escaping practices introduce a tangible risk that needs to be addressed.

Key Concerns

  • Low percentage of properly escaped outputs
Vulnerabilities
None known

Email Mentioned Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Email Mentioned Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
15
5 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

25% escaped20 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
antonem_admin_options (email-mentioned.php:231)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Email Mentioned Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionplugins_loadedemail-mentioned.php:70
actioncomment_postemail-mentioned.php:151
filteruser_search_columnsemail-mentioned.php:196
actionadmin_menuemail-mentioned.php:220
Maintenance & Trust

Email Mentioned Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Email Mentioned Developer Profile

Raulanton

3 plugins · 30 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Email Mentioned

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
email-mentioned/style.css?ver=email-mentioned/js/main.js?ver=

HTML / DOM Fingerprints

HTML Comments
Copyright Raúl Antón CuadradoES: Al publicar un comentario manda correos electrónicos a todos los citados por displaynameES: Obtiene el user id a través del display_nameES: Administración y opciones
FAQ

Frequently Asked Questions about Email Mentioned