Mailcoach Security & Risk Analysis

wordpress.org/plugins/forms-mailcoach

Embed forms easily on your WordPress site with this plugin. Use shortcodes to add them to specific pages, creating a seamless user experience.

20 active installs v0.0.16 PHP 8.1+ WP 6.2+ Updated Oct 2, 2024
developermailmailcoachmass-mailingspatie
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mailcoach Safe to Use in 2026?

Generally Safe

Score 92/100

Mailcoach has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "forms-mailcoach" plugin v0.0.16 exhibits a generally strong security posture based on the static analysis provided. The complete absence of identified CVEs in its vulnerability history is a significant positive indicator, suggesting a history of secure development or prompt patching. The code also demonstrates good practices by using prepared statements for a high percentage of its SQL queries and properly escaping a vast majority of its output. The limited attack surface with no discoverable AJAX handlers, REST API routes, or shortcodes, and no external HTTP requests, further enhances its security profile.

However, there are areas for concern. The taint analysis reveals that all four analyzed flows have unsanitized paths. While no critical or high severity issues were flagged from this, it suggests a potential for vulnerabilities if these unsanitized paths are ever exposed to user input that could be manipulated. Additionally, the lack of capability checks for any entry points is a notable weakness, meaning that potentially sensitive actions could be performed by users without the necessary permissions if an attack vector were to be discovered. The bundled Guzzle library, while not inherently insecure, could pose a risk if it's an outdated version with known vulnerabilities.

In conclusion, "forms-mailcoach" v0.0.16 is built on a foundation of good security practices, particularly regarding its limited attack surface and diligent output escaping. The absence of historical vulnerabilities is reassuring. Nevertheless, the presence of unsanitized paths in taint flows and the complete absence of capability checks on its limited entry points represent exploitable weaknesses that warrant careful consideration and potential remediation.

Key Concerns

  • Unsanitized paths in taint flows
  • No capability checks on entry points
  • Bundled Guzzle library (potential for outdated version)
Vulnerabilities
None known

Mailcoach Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Mailcoach Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
5 prepared
Unescaped Output
4
81 escaped
Nonce Checks
3
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Guzzle

SQL Query Safety

71% prepared7 total queries

Output Escaping

95% escaped85 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
storeSettings (src\Admin\SettingsController.php:34)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Mailcoach Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionadmin_initsrc\Admin\AdminMenu.php:39
actionwp_enqueue_scriptssrc\Admin\AdminMenu.php:40
actionenqueue_block_editor_assetssrc\Admin\AdminMenu.php:41
actionadmin_menusrc\Admin\AdminMenu.php:43
actionadmin_menusrc\Admin\AdminMenu.php:44
actionadmin_post_create_new_formsrc\Admin\FormsController.php:33
actionadmin_post_delete_formsrc\Admin\FormsController.php:34
actioninitsrc\Admin\FormsController.php:39
actioninitsrc\Admin\FormsController.php:40
actioninitsrc\Admin\FormsController.php:41
actionadmin_initsrc\Admin\SettingsController.php:28
actionadmin_post_nopriv_store_settings_formsrc\Admin\SettingsController.php:30
actionadmin_post_store_settings_formsrc\Admin\SettingsController.php:31
Maintenance & Trust

Mailcoach Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedOct 2, 2024
PHP min version8.1
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Mailcoach Developer Profile

freekmurze

2 plugins · 520 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mailcoach

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/forms-mailcoach/resources/dist/css/tailwind.min.css
Version Parameters
forms-mailcoach/resources/dist/css/tailwind.min.css?ver=

HTML / DOM Fingerprints

Shortcode Output
{{ form.mailcoachListId }}<input type="hidden" name="list_id" value="{{ form.mailcoachListId }}"><button type="submit"<input type="email" name="email" placeholder="
FAQ

Frequently Asked Questions about Mailcoach