Email Posts Commentators Security & Risk Analysis

wordpress.org/plugins/email-posts-commentators

Plugin to email commentators of posts

10 active installs v0.1 PHP + WP 3.0.1+ Updated Apr 26, 2015
commentsemail
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Email Posts Commentators Safe to Use in 2026?

Generally Safe

Score 85/100

Email Posts Commentators has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "email-posts-commentators" plugin version 0.1 exhibits a generally strong security posture in several key areas. The static analysis reveals no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface. Furthermore, there are no identified dangerous functions, external HTTP requests, or file operations, which are all positive indicators. The plugin also uses prepared statements for all SQL queries, mitigating common SQL injection risks. However, a significant concern arises from the output escaping. With 100% of its identified outputs being unescaped, this presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed by this plugin that originates from user input or is dynamically generated without proper sanitization could be exploited by attackers to inject malicious scripts into the WordPress site, affecting users who view the affected content.

The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive sign for its current version. This suggests that either the plugin has been developed with good security practices from the outset, or it hasn't been subjected to extensive security audits or found exploitable vulnerabilities in the past. However, the complete absence of any vulnerability history, coupled with the identified output escaping issues, might indicate a lack of thorough security testing or that the plugin's functionality is limited, thus not presenting an attractive target. While the lack of an attack surface and secure SQL practices are commendable, the unescaped output is a critical weakness that needs immediate attention to prevent potential XSS attacks.

Key Concerns

  • Unescaped output found in all identified outputs
Vulnerabilities
None known

Email Posts Commentators Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Email Posts Commentators Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

Email Posts Commentators Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuemail-posts-commentators.php:20
actionadmin_enqueue_scriptsemail-posts-commentators.php:21
filterplugin_action_linksemail-posts-commentators.php:24
filterwp_mail_content_typeemail-posts-commentators.php:177
Maintenance & Trust

Email Posts Commentators Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedApr 26, 2015
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Email Posts Commentators Developer Profile

Ashish Kumar (Ashfame)

4 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Email Posts Commentators

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/email-posts-commentators/chosen/chosen.jquery.js/wp-content/plugins/email-posts-commentators/chosen/chosen.css
Script Paths
chosen/chosen.jquery.js

HTML / DOM Fingerprints

CSS Classes
chosen-select
Data Attributes
data-placeholderid="selected-posts"name="selected-posts"name="bcc-email"name="exclude-emails"name="email-subject"+1 more
JS Globals
jQuery$
FAQ

Frequently Asked Questions about Email Posts Commentators