Emu2 – Email Users 2 Security & Risk Analysis

wordpress.org/plugins/emu2-email-users-2

Send email to users, manually or on schedule (digest of newest posts). Users can send emails to each other. Export function included. STILL BETA!!!

80 active installs v0.83b PHP + WP 2.8+ Updated Nov 23, 2011
adminemaillistmailingusers
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEAug 16, 2025
Safety Verdict

Is Emu2 – Email Users 2 Safe to Use in 2026?

Use With Caution

Score 63/100

Emu2 – Email Users 2 has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Aug 16, 2025Updated 14yr ago
Risk Assessment

The emu2-email-users-2 plugin exhibits several concerning security weaknesses despite a seemingly small attack surface. The static analysis reveals a significant number of SQL queries with only 20% using prepared statements, indicating a high risk of SQL injection vulnerabilities. Furthermore, a critical finding is that 0% of output is properly escaped, which, combined with 6 out of 7 analyzed taint flows having unsanitized paths and 3 of those being high severity, strongly suggests a substantial risk of cross-site scripting (XSS) attacks. The absence of nonce checks on any entry points further exacerbates these risks by allowing unauthorized actions if an attacker can trigger these functionalities.

The vulnerability history, including a medium severity CVE related to XSS, corroborates the findings from the static analysis. The fact that this CVE is currently unpatched is a critical concern. While the plugin doesn't appear to have a large external attack surface in terms of unprotected entry points, the internal code quality regarding data sanitization and output escaping is a major point of failure. The presence of multiple capability checks suggests an awareness of access control, but this is undermined by the lack of fundamental security practices.

In conclusion, the emu2-email-users-2 plugin poses a significant security risk. The high prevalence of unsanitized taint flows, complete lack of output escaping, and unpatched XSS vulnerability are critical issues that require immediate attention. While the plugin has a limited number of exposed entry points, the internal code's susceptibility to injection and XSS attacks makes it a dangerous component to have active on a WordPress site.

Key Concerns

  • Unescaped output (0%)
  • High severity unsanitized taint flows (3)
  • Raw SQL queries (80% without prepare)
  • Unpatched medium CVE
  • No nonce checks
Vulnerabilities
1

Emu2 – Email Users 2 Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-52750medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Emu2 <= 0.83b - Reflected Cross-Site Scripting

Aug 16, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Emu2 – Email Users 2 Code Analysis

Dangerous Functions
0
Raw SQL Queries
8
2 prepared
Unescaped Output
82
0 escaped
Nonce Checks
0
Capability Checks
35
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

20% prepared10 total queries

Output Escaping

0% escaped82 total outputs
Data Flows
6 unsanitized

Data Flow Analysis

7 flows6 with unsanitized paths
<emu2_core> (emu2_core.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Emu2 – Email Users 2 Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionEMU2_task_hookemu2.php:66
actionadmin_menuemu2.php:72
actionuser_registeremu2.php:293
actionsubmitpost_boxemu2.php:306
actionsubmitpage_boxemu2.php:320
actionadmin_menuemu2.php:338
actionshow_user_profileemu2.php:388
actionpersonal_options_updateemu2.php:421
filteradmin_initemu2.php:436

Scheduled Events 1

EMU2_task_hook
Maintenance & Trust

Emu2 – Email Users 2 Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedNov 23, 2011
PHP min version
Downloads20K

Community Trust

Rating80/100
Number of ratings1
Active installs80
Developer Profile

Emu2 – Email Users 2 Developer Profile

Juergen Schulze

6 plugins · 1K total installs

83
trust score
Avg Security Score
84/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Emu2 – Email Users 2

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Emu2 – Email Users 2