EmailZap Security & Risk Analysis

wordpress.org/plugins/emailzap

A lightweight and secure plugin that switches your WordPress email sending to SMTP. Configure your SMTP server easily from the admin panel.

0 active installs v1.0.0 PHP 7.4+ WP 6.2+ Updated Jul 18, 2025
emailmailsmtp
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is EmailZap Safe to Use in 2026?

Generally Safe

Score 100/100

EmailZap has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8mo ago
Risk Assessment

The emailzap v1.0.0 plugin exhibits a strong security posture based on the provided static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events with exposed entry points, combined with the lack of direct SQL queries and file operations, significantly limits its attack surface. Furthermore, the presence of 100% prepared statements for any potential SQL interactions and the generally low number of total outputs suggest good coding practices in this area. The vulnerability history also shows no recorded CVEs, indicating a lack of publicly known security flaws.

However, the static analysis does highlight a notable concern: only 55% of output is properly escaped. This means that a significant portion of output generated by the plugin might be vulnerable to Cross-Site Scripting (XSS) attacks if user-supplied data is incorporated into these unescaped outputs. While the plugin has no recorded vulnerabilities to date, this unescaped output presents a potential avenue for exploitation. The absence of nonce and capability checks on entry points, coupled with the lack of external HTTP requests and bundled libraries, further reinforces the minimal attack surface, but the output escaping deficiency is the primary risk identified in the code. Overall, the plugin is well-structured with a limited attack surface, but the unescaped output requires attention to mitigate potential XSS risks.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

EmailZap Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

EmailZap Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

55% escaped11 total outputs
Attack Surface

EmailZap Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuemailzap.php:25
actionadmin_initemailzap.php:26
actionphpmailer_initemailzap.php:27
Maintenance & Trust

EmailZap Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJul 18, 2025
PHP min version7.4
Downloads234

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

EmailZap Developer Profile

TAKAHIRO

6 plugins · 70 total installs

93
trust score
Avg Security Score
99/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect EmailZap

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="emailzap_options[host]"name="emailzap_options[port]"name="emailzap_options[secure]"name="emailzap_options[auth]"name="emailzap_options[username]"name="emailzap_options[password]"
FAQ

Frequently Asked Questions about EmailZap