Email Post Activation Security & Risk Analysis

wordpress.org/plugins/email-post-activation

Adds an iFrame to your blog footer to automatically activate any posts written by email.

10 active installs v1.0 PHP + WP 1.5+ Updated Unknown
activationbrowseremailpost
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Email Post Activation Safe to Use in 2026?

Generally Safe

Score 100/100

Email Post Activation has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "email-post-activation" plugin, version 1.0, exhibits a generally positive security posture based on the provided static analysis. The absence of any known CVEs and a clean vulnerability history, coupled with the lack of identified dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), file operations, or external HTTP requests, suggests a cautious and well-developed approach to security. Furthermore, the plugin has no discernible attack surface in terms of AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces the potential for external manipulation.

However, a notable concern arises from the output escaping. With one total output identified and 0% properly escaped, there is a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that is not properly escaped could be exploited by an attacker to inject malicious scripts. The lack of capability checks and nonce checks, while less critical given the minimal attack surface, also represents a missed opportunity to implement standard WordPress security practices. Overall, the plugin is strong in preventing common vulnerabilities but has a significant weakness in output sanitization that needs immediate attention.

Key Concerns

  • Output not properly escaped
  • No capability checks
  • No nonce checks
Vulnerabilities
None known

Email Post Activation Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Email Post Activation Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Email Post Activation Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_footeremail-post-activation.php:30
actionplugins_loadedemail-post-activation.php:44
Maintenance & Trust

Email Post Activation Maintenance & Trust

Maintenance Signals

WordPress version tested2.7.1
Last updatedUnknown
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Email Post Activation Developer Profile

paulmac

4 plugins · 80 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Email Post Activation

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<iframe src="/wp-mail.php" name="mailiframe" width="0" height="0" frameborder="0" scrolling="no" title=""></iframe>
FAQ

Frequently Asked Questions about Email Post Activation