Email Verify Security & Risk Analysis

wordpress.org/plugins/email-verify

Verifies your Users email addresses and blocks them from register to your site.

90 active installs v1.1.6 PHP + WP 4.3+ Updated Jun 30, 2025
emailverification
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Email Verify Safe to Use in 2026?

Generally Safe

Score 100/100

Email Verify has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10mo ago
Risk Assessment

The "email-verify" plugin v1.1.6 exhibits a mixed security posture. On one hand, it boasts a zero attack surface from common entry points like AJAX, REST API, shortcodes, and cron events, and all SQL queries are properly prepared. This indicates good practices in limiting exposure and handling database interactions securely. However, several concerning code signals were detected. The presence of the `exec` function, even if not immediately exploitable due to a lack of identified flows, is a significant red flag. Furthermore, zero output escaping on all detected outputs represents a critical vulnerability that could lead to cross-site scripting (XSS) attacks. The absence of nonce and capability checks across the board exacerbates these risks, as any identified entry points or functions could be executed without proper authorization or validation.

The vulnerability history for this plugin is remarkably clean, with no recorded CVEs. This suggests a history of responsible development or perhaps a lack of targeted security research against it. While this is positive, it does not negate the immediate risks identified in the static analysis. The combination of a clean history and significant code-level vulnerabilities means that while the plugin hasn't been historically problematic, the current version has clear weaknesses that need addressing. The strengths lie in its limited attack surface and secure database practices, but the weaknesses in output escaping, the presence of `exec`, and lack of authorization checks are substantial concerns that outweigh these positives in the short term.

Key Concerns

  • Presence of dangerous function 'exec'
  • 0% output escaping
  • 0 Nonce checks
  • 0 Capability checks
Vulnerabilities
None known

Email Verify Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Email Verify Release Timeline

v1.1.6Current
v1.1.5
v1.1.4
v1.1.3
v1.1.2
v1.1.1
v1.1
v1.0
Code Analysis
Analyzed Mar 16, 2026

Email Verify Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
1 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

execexec( $cmd, $output );classes\smtp-validate-email.php:818

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped1 total outputs
Attack Surface

Email Verify Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterregistration_errorsclasses\emailverify.class.php:18
filteruser_profile_update_errorsclasses\emailverify.class.php:19
actionadmin_menuclasses\emailverify.class.php:20
actionadmin_initclasses\emailverify.class.php:21
Maintenance & Trust

Email Verify Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJun 30, 2025
PHP min version
Downloads4K

Community Trust

Rating80/100
Number of ratings4
Active installs90
Developer Profile

Email Verify Developer Profile

EverPress

28 plugins · 120K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
255 days
View full developer profile
Detection Fingerprints

How We Detect Email Verify

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/email-verify/assets/css/admin.css/wp-content/plugins/email-verify/assets/js/admin.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Email Verify