Email Subscription Popup Security & Risk Analysis

wordpress.org/plugins/email-subscribe

This plugin shows you a beautiful newsletter subscription popup when someone enter to your site. You can even use widget that allow email subscription …

1K active installs v1.0 PHP + WP 3.0+ Updated Dec 4, 2025
newsletter-widgetresponsive-newsletter-signupwordpress-email-subscriptionwordpress-email-subscription-plugin-popupwordpress-newsletter-popup
95
A · Safe
CVEs total7
Unpatched0
Last CVEOct 22, 2025
Safety Verdict

Is Email Subscription Popup Safe to Use in 2026?

Generally Safe

Score 95/100

Email Subscription Popup has a strong security track record. Known vulnerabilities have been patched promptly.

7 known CVEsLast CVE: Oct 22, 2025Updated 4mo ago
Risk Assessment

The "email-subscribe" plugin v1.0 exhibits a mixed security posture. While it demonstrates good practices like using prepared statements for all SQL queries and including nonce checks on its AJAX handlers, several critical areas raise significant concerns. The complete absence of output escaping on 182 identified outputs is a major weakness, making it highly susceptible to Cross-Site Scripting (XSS) vulnerabilities. Furthermore, one out of three AJAX handlers lacks any authentication checks, presenting a direct pathway for unauthenticated attackers to potentially exploit the plugin.

The vulnerability history is particularly worrying. A total of 7 medium-severity CVEs have been documented, with common types including XSS and SQL Injection. Although there are currently no unpatched vulnerabilities, this history indicates a recurring pattern of insecure coding practices in the past. The presence of 182 unescaped outputs, combined with a known history of XSS and SQLi, strongly suggests that these vulnerabilities are likely to resurface or still exist if not diligently addressed.

In conclusion, despite some positive security implementations, the "email-subscribe" plugin v1.0 has significant security weaknesses, primarily due to the widespread lack of output escaping and an unprotected AJAX endpoint. The historical prevalence of XSS and SQL injection vulnerabilities, even if currently patched, amplifies the risk associated with these code-level deficiencies. Users should exercise extreme caution and ensure robust security measures are in place, or consider alternatives if these issues are not promptly rectified by the developers.

Key Concerns

  • 182 outputs with 0% proper escaping
  • 1 AJAX handler without auth checks
  • 7 medium severity CVEs in history
Vulnerabilities
7

Email Subscription Popup Security Vulnerabilities

CVEs by Year

3 CVEs in 2023
2023
2 CVEs in 2024
2024
2 CVEs in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
7

7 total CVEs

CVE-2025-49912medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Email Subscription Popup <= 1.2.26 - Authenticated (Administrator+) Stored Cross-Site Scripting

Oct 22, 2025 Patched in 1.2.27 (8d)
CVE-2025-24587medium · 4.9Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Email Subscription Popup <= 1.2.23 - Authenticated (Administrator+) SQL Injection

Jan 24, 2025 Patched in 1.2.24 (5d)
CVE-2024-11195medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Email Subscription Popup <= 1.2.22 - Authenticated (Contributor+) Stored Cross-Site Scripting via print_email_subscribe_form Shortcode

Nov 18, 2024 Patched in 1.2.23 (1d)
CVE-2024-27960medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Email Subscription Popup <= 1.2.20 - Unauthenticated Stored Cross-Site Scripting

Mar 13, 2024 Patched in 1.2.21 (8d)
CVE-2023-6555medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Email Subscription Popup <= 1.2.19 - Reflected Cross-Site Scripting

Dec 15, 2023 Patched in 1.2.20 (54d)
CVE-2023-6527medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Email Subscription Popup <= 1.2.18 - Reflected Cross-Site Scripting

Dec 5, 2023 Patched in 1.2.19 (49d)
CVE-2023-30489medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Email Subscription Popup <= 1.2.16 - Reflected Cross-Site Scripting

Apr 7, 2023 Patched in 1.2.17 (291d)
Code Analysis
Analyzed Mar 16, 2026

Email Subscription Popup Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
182
0 escaped
Nonce Checks
3
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

0% escaped182 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
massEmailToEmail_Subscriber_Func (wp-email-subscription.php:892)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Email Subscription Popup Attack Surface

Entry Points3
Unprotected1

AJAX Handlers 3

authwp_ajax_getEmailTemplatewp-email-subscription.php:17
authwp_ajax_store_emailwp-email-subscription.php:19
noprivwp_ajax_store_emailwp-email-subscription.php:20
WordPress Hooks 4
actionadmin_menuwp-email-subscription.php:11
actionwp_enqueue_scriptswp-email-subscription.php:14
actionwp_footerwp-email-subscription.php:15
actionwidgets_initwp-email-subscription.php:18
Maintenance & Trust

Email Subscription Popup Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 4, 2025
PHP min version
Downloads134K

Community Trust

Rating76/100
Number of ratings11
Active installs1K
Developer Profile

Email Subscription Popup Developer Profile

Nks

19 plugins · 23K total installs

77
trust score
Avg Security Score
97/100
Avg Patch Time
350 days
View full developer profile
Detection Fingerprints

How We Detect Email Subscription Popup

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/email-subscribe/css/wp-email-subscription-popup.css/wp-content/plugins/email-subscribe/js/wp-email-subscription-popup-js.js/wp-content/plugins/email-subscribe/js/subscribe-popup.js/wp-content/plugins/email-subscribe/css/subscribe-popup.css
Script Paths
/wp-content/plugins/email-subscribe/js/wp-email-subscription-popup-js.js/wp-content/plugins/email-subscribe/js/subscribe-popup.js
Version Parameters
wp-email-subscription-popup?ver=subscribe-popup?ver=

HTML / DOM Fingerprints

CSS Classes
overlaymydivcontainer_nAjaxLoadermyerror_msgmysuccess_msgtextfielderrorinput+1 more
Data Attributes
id="mainoverlayDiv"id="formFormEmail"id="newsletter_signup"id="myerror_msg"id="mysuccess_msg"id="youremail"+2 more
JS Globals
var $n = jQuery.noConflict();var htmlpopup=$n("#formFormEmail").html();
FAQ

Frequently Asked Questions about Email Subscription Popup