EmailWish Security & Risk Analysis

wordpress.org/plugins/emailwish

EmailWish is an email marketing solution designed for ecommerce, offering powerful automation tools to drive the growth of businesses of every size.

0 active installs v1.0.6 PHP 7.0+ WP 4.9+ Updated Mar 3, 2024
automationecommerceemail-marketingnewsletterwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EmailWish Safe to Use in 2026?

Generally Safe

Score 85/100

EmailWish has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The emailwish v1.0.6 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding SQL query sanitization and output escaping, with all queries using prepared statements and all outputs being properly escaped. The absence of known CVEs and a history of vulnerabilities is also a significant strength, suggesting a developer who is either diligent about security or has not yet encountered exploitable flaws. However, significant concerns arise from the attack surface analysis. Three of the four identified entry points (AJAX handlers and REST API routes) lack any authentication or permission checks. This creates a substantial risk, as unauthenticated users could potentially interact with these endpoints, leading to unintended actions or information disclosure.

The taint analysis reveals two flows with unsanitized paths, though these are not classified as critical or high severity. Nevertheless, any unsanitized path presents a potential avenue for exploitation. The absence of nonce checks on AJAX handlers further exacerbates the risk posed by the unprotected AJAX endpoint, making it susceptible to Cross-Site Request Forgery (CSRF) attacks. While the plugin avoids dangerous functions and file operations, and correctly uses prepared statements for SQL, the lack of robust access control on multiple entry points is its most critical weakness. In conclusion, while emailwish v1.0.6 has strong foundations in data handling and sanitization, its security is significantly undermined by insufficient authentication and authorization mechanisms for its exposed endpoints.

Key Concerns

  • Unprotected AJAX handler
  • Unprotected REST API route
  • Unprotected REST API route
  • Missing nonce checks on AJAX
  • Flows with unsanitized paths
Vulnerabilities
None known

EmailWish Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

EmailWish Release Timeline

v1.0
Code Analysis
Analyzed Mar 17, 2026

EmailWish Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
5 prepared
Unescaped Output
0
22 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared5 total queries

Output Escaping

100% escaped22 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
emailwish_update_customer_id_endpoint_handler (chat-popup-review.php:240)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
3 unprotected

EmailWish Attack Surface

Entry Points4
Unprotected3

AJAX Handlers 1

authwp_ajax_emailwish_connect_or_create_accountchat-popup-review.php:105

REST API Routes 2

GET/wp-json/wp/v2/update_customer_idchat-popup-review.php:176
GET/wp-json/wp/v2/emailwish_cartchat-popup-review.php:191

Shortcodes 1

[emailwish_all_reviews] chat-popup-review.php:371
WordPress Hooks 14
actionadmin_menuchat-popup-review.php:169
actionrest_api_initchat-popup-review.php:186
actionrest_api_initchat-popup-review.php:201
filterwp_footerchat-popup-review.php:271
actionwp_enqueue_scriptschat-popup-review.php:284
actionwp_enqueue_scriptschat-popup-review.php:297
actionactivated_pluginchat-popup-review.php:316
actionwoocommerce_single_product_summarychat-popup-review.php:337
actioninitchat-popup-review.php:338
actionwoocommerce_single_product_summarychat-popup-review.php:339
actionwoocommerce_after_single_product_summarychat-popup-review.php:345
actionwoocommerce_initchat-popup-review.php:353
actionenqueue_block_editor_assetschat-popup-review.php:365
actionelementor/widgets/widgets_registeredchat-popup-review.php:373
Maintenance & Trust

EmailWish Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedMar 3, 2024
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

EmailWish Developer Profile

Emailwish

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect EmailWish

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/emailwish/images/woo-emailwish.png/wp-content/plugins/emailwish/css/wck-admin.css/wp-content/plugins/emailwish/js/emailwish.js
Script Paths
js/emailwish.js
Version Parameters
wck-admin.css?ver=emailwish.js?ver=

HTML / DOM Fingerprints

CSS Classes
wck-settingswck-content-wrapperwck-contentwck-logowck-content-subtitleswck-content-titlewck-content-subtitleconnect-buttons+1 more
Data Attributes
data-woodata-emailwish
JS Globals
ajax_object
REST Endpoints
/wp-json/wp/v2/update_customer_id/wp-json/wp/v2/emailwish_cart
FAQ

Frequently Asked Questions about EmailWish