
F13 Email Security & Risk Analysis
wordpress.org/plugins/f13-emailConfigure SMTP email, dynamic contact form builder and email logs - All in one plugin!
Is F13 Email Safe to Use in 2026?
Generally Safe
Score 85/100F13 Email has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The f13-email plugin version 1.0.2 exhibits a mixed security posture. On the positive side, it demonstrates strong practices regarding SQL queries, exclusively using prepared statements, and shows a high percentage of properly escaped output. The absence of known vulnerabilities in its history and no recorded critical or high-severity issues further suggest a generally well-maintained codebase. However, a significant concern lies in its attack surface. With a total of 4 entry points, 3 of which are AJAX handlers, and all 3 lacking any authentication checks, this presents a substantial risk. The plugin also lacks nonce checks for these critical entry points, making it susceptible to Cross-Site Request Forgery (CSRF) attacks. While taint analysis shows no immediate critical issues, the unprotected AJAX endpoints could be exploited if they process unsanitized user input in a way that leads to vulnerabilities later in the execution flow, even if not directly flagged by the static analysis.
Despite the absence of recorded CVEs, the unprotected AJAX handlers represent a glaring security weakness that could be easily exploited by attackers. The fact that only one capability check is present across all entry points further emphasizes the lack of robust authorization. While the plugin performs well in SQL and output sanitization, the unprotected AJAX endpoints are a major vulnerability. Therefore, while the plugin avoids common pitfalls like raw SQL or outdated libraries, its attack surface management is a critical area needing immediate attention to mitigate potential security breaches.
Key Concerns
- 3 unprotected AJAX handlers
- 0 nonce checks on AJAX
- 1 capability check total
F13 Email Security Vulnerabilities
F13 Email Code Analysis
SQL Query Safety
Output Escaping
F13 Email Attack Surface
AJAX Handlers 3
Shortcodes 1
WordPress Hooks 5
Maintenance & Trust
F13 Email Maintenance & Trust
Maintenance Signals
Community Trust
F13 Email Alternatives
WPZOOM Forms – Drag & Drop Contact Form Builder for WordPress
wpzoom-forms
Drag & drop contact form builder for WordPress. Create contact forms, custom forms, email forms with spam protection. Works with Elementor, shortcodes
VPSUForm – Drag & Drop Contact Form Builder with Email Automation
v-form
A lightweight drag-and-drop WordPress form builder with email automation, conditional logic, spam protection, and full lead management.
Forms Rb
forms-rb
Forms Rb - the most simple way to create a hosted form, contact form, order form, support form. Simple contact form setup and form fields management
OmniForm
omniform
Easily create and manage custom forms with the block editor, customizable fields, and form submission management for your website.
GenForm – Drag & Drop Form Builder
genform
The lightweight drag-and-drop form builder for WordPress. Create contact forms, feedback forms, bookings, and more — no coding required.
F13 Email Developer Profile
8 plugins · 90 total installs
How We Detect F13 Email
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/f13-email/css/f13-email-admin.css/wp-content/plugins/f13-email/js/f13-email-admin.js/wp-content/plugins/f13-email/js/f13-email-ajax.js/wp-content/plugins/f13-email/css/f13-email.css/wp-content/plugins/f13-email/js/f13-email-admin.js/wp-content/plugins/f13-email/js/f13-email-ajax.jsf13-email-adminf13-email-ajaxf13-emailHTML / DOM Fingerprints
f13-errorf13-successdata-f13-email-form-id<form<select<input type="text"<input type="email"