EmailSystem Security & Risk Analysis

wordpress.org/plugins/emailsystem

Use a Drag and Drop Form Builder to create Subscription Forms for the EmailSystem email marketing platform.

30 active installs v1.4 PHP + WP 4.9.8+ Updated Unknown
emailsystemformnewslettersubscribewebform
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EmailSystem Safe to Use in 2026?

Generally Safe

Score 100/100

EmailSystem has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "emailsystem" v1.4 plugin exhibits a mixed security posture. While it demonstrates good practices by using prepared statements for all SQL queries and has no recorded vulnerabilities or CVEs, several significant concerns are present in the static analysis. The plugin has a relatively small attack surface but includes an unprotected AJAX handler, which is a critical entry point. The taint analysis also reveals flows with unsanitized paths, although they are not classified as critical or high severity, this still indicates potential for unexpected behavior or data manipulation. A notable weakness is the lack of capability checks and nonce checks on its entry points, leaving it vulnerable to unauthorized actions and cross-site request forgery attacks. The output escaping is also a concern, with nearly half of the outputs not being properly escaped, increasing the risk of cross-site scripting vulnerabilities.

Key Concerns

  • AJAX handler without authentication
  • Lack of capability checks
  • Lack of nonce checks
  • Significant percentage of unescaped output
  • Flows with unsanitized paths
Vulnerabilities
None known

EmailSystem Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

EmailSystem Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
68
61 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
6
Bundled Libraries
0

Output Escaping

47% escaped129 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
empostsave (emailsystem.php:140)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

EmailSystem Attack Surface

Entry Points2
Unprotected1

AJAX Handlers 1

authwp_ajax_empostsaveemailsystem.php:34

Shortcodes 1

[emailsystemform] emailsystem.php:31
WordPress Hooks 16
actioninitemailsystem.php:21
actioninitemailsystem.php:22
actionadmin_enqueue_scriptsemailsystem.php:23
actionadmin_initemailsystem.php:24
actionadmin_menuemailsystem.php:25
actionadmin_menuemailsystem.php:26
actionadmin_menuemailsystem.php:27
actionadmin_menuemailsystem.php:28
filtermanage_emailsystemform_posts_columnsemailsystem.php:29
actionmanage_emailsystemform_posts_custom_columnemailsystem.php:30
actionwp_loadedemailsystem.php:32
actionplugins_loadedemailsystem.php:33
filterget_edit_post_linkemailsystem.php:35
actionwoocommerce_checkout_before_terms_and_conditionsemailsystem.php:415
actionwoocommerce_checkout_update_order_metaemailsystem.php:426
actionwoocommerce_thankyouemailsystem.php:431
Maintenance & Trust

EmailSystem Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

EmailSystem Developer Profile

EmailSystem

1 plugin · 30 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect EmailSystem

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/emailsystem/assets/images/emailsystem.svg

HTML / DOM Fingerprints

Data Attributes
id="emailsystemform-metabox"
Shortcode Output
[emailsystemform id=
FAQ

Frequently Asked Questions about EmailSystem