Email Subscription Box After Post Content Security & Risk Analysis

wordpress.org/plugins/email-subscription-box-after-post-content

Email Subscription Box After Post Content helps to insert a feed burner email subscription box after every post.

10 active installs v1.1 PHP + WP 2.9+ Updated Jan 10, 2011
email-subscriptionfeed-burner-email-subscriptionfeedburner
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Email Subscription Box After Post Content Safe to Use in 2026?

Generally Safe

Score 85/100

Email Subscription Box After Post Content has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "email-subscription-box-after-post-content" plugin v1.1 exhibits a generally good security posture concerning its attack surface. The static analysis reveals no AJAX handlers, REST API routes, shortcodes, or cron events, significantly limiting potential entry points for attackers. Furthermore, the absence of dangerous functions and file operations is a positive indicator. The use of prepared statements for SQL queries is excellent practice.

However, a significant concern arises from the output escaping analysis, which indicates that 100% of the identified output points are not properly escaped. This presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the output displayed to users. The lack of any recorded vulnerability history might suggest diligent development or a lack of past targeted exploitation, but it does not negate the immediate risk identified by the unescaped output.

In conclusion, while the plugin boasts a minimal attack surface and secure SQL handling, the prevalent lack of output escaping is a critical weakness that demands immediate attention. The absence of vulnerabilities in its history is a positive sign but should not lead to complacency, especially given the clear code-level risk. Addressing the XSS vulnerability is paramount for improving the plugin's overall security.

Key Concerns

  • All identified output not properly escaped
Vulnerabilities
None known

Email Subscription Box After Post Content Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Email Subscription Box After Post Content Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Email Subscription Box After Post Content Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuEmail-Subscription-Box-After-Post-Content.php:17
actionthe_contentEmail-Subscription-Box-After-Post-Content.php:18
actionwp_headEmail-Subscription-Box-After-Post-Content.php:19
Maintenance & Trust

Email Subscription Box After Post Content Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedJan 10, 2011
PHP min version
Downloads8K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Email Subscription Box After Post Content Developer Profile

cre8tivenerd

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Email Subscription Box After Post Content

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/email-subscription-box-after-post-content/emailS.css

HTML / DOM Fingerprints

CSS Classes
fformemsb-rssemsbtxtbtn
Data Attributes
id="ES_form"id="rss"id="email"id="feedid"
JS Globals
window.open
FAQ

Frequently Asked Questions about Email Subscription Box After Post Content