Email Subscribers – Group Selector Security & Risk Analysis

wordpress.org/plugins/email-subscribers-advanced-form

Add-on for Email Subscribers plugin using which you can provide option to your users to select interested groups in the Subscribe Form.

300 active installs v1.5.1 PHP + WP 3.9+ Updated Mar 1, 2019
email-marketingemail-newsletter-formemail-signupemail-widgetgroup-selection
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Email Subscribers – Group Selector Safe to Use in 2026?

Generally Safe

Score 85/100

Email Subscribers – Group Selector has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "email-subscribers-advanced-form" plugin v1.5.1 exhibits a generally good security posture with no recorded vulnerabilities or critical issues identified in taint analysis. The high percentage of prepared SQL statements is a strong positive indicator of secure database interaction. The plugin also demonstrates a responsible approach to its limited attack surface, with no unprotected entry points found in the static analysis. The presence of nonce checks further enhances security by protecting against certain types of cross-site request forgery attacks.

However, a significant concern arises from the very low percentage of properly escaped output. With only 1% of 139 outputs being properly escaped, there is a high likelihood of cross-site scripting (XSS) vulnerabilities. This is further supported by the taint analysis, which found one flow with an unsanitized path, even though it wasn't classified as critical or high severity, suggesting a potential avenue for malicious input to be processed without adequate sanitization.

Given the absence of historical vulnerabilities, it might indicate diligent maintenance or that the plugin's functionality has not been a target. Nevertheless, the identified output escaping weakness is a serious concern that requires immediate attention. The plugin's strengths lie in its controlled attack surface and secure SQL practices, but the prevalent lack of output escaping poses a substantial risk that overshadows these positives.

Key Concerns

  • Low percentage of properly escaped output
  • Taint flow with unsanitized path
Vulnerabilities
None known

Email Subscribers – Group Selector Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Email Subscribers – Group Selector Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
10 prepared
Unescaped Output
137
2 escaped
Nonce Checks
4
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

91% prepared11 total queries

Output Escaping

1% escaped139 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
esaf_dismiss_admin_notice (includes\es-af-register.php:132)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Email Subscribers – Group Selector Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[email-subscribers-advanced-form] email-subscribers-advanced-form.php:33
WordPress Hooks 7
actionwidgets_initemail-subscribers-advanced-form.php:25
actionadmin_menuemail-subscribers-advanced-form.php:26
actionadmin_enqueue_scriptsemail-subscribers-advanced-form.php:27
actionadmin_noticesemail-subscribers-advanced-form.php:30
actionadmin_initemail-subscribers-advanced-form.php:31
actionplugins_loadedemail-subscribers-advanced-form.php:46
actionwp_enqueue_scriptsemail-subscribers-advanced-form.php:47
Maintenance & Trust

Email Subscribers – Group Selector Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMar 1, 2019
PHP min version
Downloads20K

Community Trust

Rating86/100
Number of ratings10
Active installs300
Developer Profile

Email Subscribers – Group Selector Developer Profile

Icegram

8 plugins · 84K total installs

75
trust score
Avg Security Score
94/100
Avg Patch Time
571 days
View full developer profile
Detection Fingerprints

How We Detect Email Subscribers – Group Selector

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/email-subscribers-advanced-form/assets/css/styles.css
Script Paths
/wp-content/plugins/email-subscribers-advanced-form/includes/form/setting.js
Version Parameters
email-subscribers-advanced-form/assets/css/styles.css?ver=email-subscribers-advanced-form/includes/form/setting.js?ver=

HTML / DOM Fingerprints

CSS Classes
es-gdpr-admin-btnes-gdpr-admin-btn-secondary
Data Attributes
data-esaf_form_titledata-esaf_settings_delete_record
JS Globals
esaf_settings_notices
Shortcode Output
[email-subscribers-advanced-form]
FAQ

Frequently Asked Questions about Email Subscribers – Group Selector