Email Post Changes Security & Risk Analysis

wordpress.org/plugins/email-post-changes

Emails you whenever a change to a post or page is made.

600 active installs v1.7.2 PHP + WP 3.2+ Updated Aug 21, 2024
changediffemailpagepost
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Email Post Changes Safe to Use in 2026?

Generally Safe

Score 92/100

Email Post Changes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "email-post-changes" plugin v1.7.2 exhibits a strong security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events indicates a minimal attack surface. Furthermore, the code signals are overwhelmingly positive, with no dangerous functions, all SQL queries using prepared statements, and all output properly escaped. The plugin also avoids file operations and external HTTP requests. The presence of a capability check is a good practice for controlling access to plugin functionalities.

Taint analysis reveals no identified flows with unsanitized paths, and the vulnerability history shows no known CVEs. This lack of historical vulnerabilities and positive static analysis results suggest that the plugin has been developed with security in mind, and its current version is likely free of common or severe vulnerabilities. The plugin's strengths lie in its clean code, limited attack surface, and the absence of exploitable patterns.

However, the complete absence of nonce checks and the sole capability check are areas that warrant consideration. While the current static analysis and vulnerability history do not reveal any immediate issues, relying solely on a capability check without nonces could potentially leave certain functionalities vulnerable if the attack surface were to expand in future versions or if the capability check itself were insufficient. The lack of any taint analysis flows, while positive, might also indicate a very limited scope of operations for the plugin, which is generally good but could mean that more complex interactions that *could* introduce taint are simply not present. Overall, the plugin appears secure for its current functionality.

Key Concerns

  • No nonce checks found
Vulnerabilities
None known

Email Post Changes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Email Post Changes Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
21 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped21 total outputs
Attack Surface

Email Post Changes Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionpost_updatedclass.email-post-changes.php:38
actionepc_new_bbpress_itemclass.email-post-changes.php:39
actionadmin_menuclass.email-post-changes.php:43
actionphpmailer_initclass.email-post-changes.php:144
actioninitemail-post-changes.php:19
Maintenance & Trust

Email Post Changes Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedAug 21, 2024
PHP min version
Downloads34K

Community Trust

Rating80/100
Number of ratings13
Active installs600
Developer Profile

Email Post Changes Developer Profile

Michael Adams (mdawaffe)

7 plugins · 12K total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Email Post Changes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
diffdiff-deletedlinediff-addedlinediff-context
Data Attributes
style
FAQ

Frequently Asked Questions about Email Post Changes