EmailToAscii Security & Risk Analysis

wordpress.org/plugins/emailtoascii

EmailToAscii replaces email addresses in the content (post or page) by their ascii translation in order to avoid spam bots.

10 active installs v1.5 PHP + WP 2.7+ Updated Apr 7, 2010
anti-spamascii-encodeemailspamspam-protection
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EmailToAscii Safe to Use in 2026?

Generally Safe

Score 85/100

EmailToAscii has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The "emailtoascii" v1.5 plugin exhibits a generally strong security posture based on the provided static analysis. It demonstrates excellent adherence to secure coding practices by avoiding raw SQL queries, properly escaping all output, and not performing any file operations or external HTTP requests. The absence of any known CVEs or historical vulnerabilities further contributes to a positive security assessment. However, a notable concern arises from the presence of a 'dangerous function' signal, specifically `preg_replace(/e)`. While the static analysis shows zero taint flows and no identified vulnerabilities, this function is historically associated with remote code execution vulnerabilities in PHP if not handled with extreme care and proper sanitization. The lack of explicit nonce checks, capability checks, and an attack surface of zero entry points might be due to the plugin's functionality being very limited or internal. The absence of these checks is not a direct vulnerability in this specific case due to the lack of entry points, but it's a practice that could introduce risks if the plugin were to be expanded in the future.

Key Concerns

  • Presence of dangerous function preg_replace(/e)
  • No Nonce checks present
  • No Capability checks present
Vulnerabilities
None known

EmailToAscii Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

EmailToAscii Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

EmailToAscii Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

preg_replace(/e)preg_replace('/(\b[a-zA-Z0-9\.-_]+\@{1}[a-zA-Z0-9\.-]+\b)/e'emailascii.php:15
Attack Surface

EmailToAscii Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterthe_contentemailascii.php:11
Maintenance & Trust

EmailToAscii Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedApr 7, 2010
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

EmailToAscii Developer Profile

Bensventures

3 plugins · 120 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect EmailToAscii

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
&#
FAQ

Frequently Asked Questions about EmailToAscii