Free Post Mail Security & Risk Analysis

wordpress.org/plugins/free-post-mail

Free Post Mailは無料でご利用いただけるお問い合わせ・資料請求フォームです。 メールフォーム内の各入力項目はユーザー自身で自由に定義することができます。 また、フォームごとに受信メールアドレス、送信メールアドレス、自動返信メールの内容を指定することができます。 Localization …

60 active installs v1.0 PHP + WP 3.5+ Updated Sep 26, 2017
%e3%83%95%e3%82%a9%e3%83%bc%e3%83%a0%e3%83%a1%e3%83%bc%e3%83%ab%e3%83%a1%e3%83%bc%e3%83%ab%e3%83%95%e3%82%a9%e3%83%bc%e3%83%a0%e8%b3%87%e6%96%99%e8%ab%8b%e6%b1%82%e5%95%8f%e3%81%84%e5%90%88%e3%82%8f%e3%81%9b
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Free Post Mail Safe to Use in 2026?

Generally Safe

Score 85/100

Free Post Mail has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'free-post-mail' v1.0 plugin exhibits a generally positive security posture based on the provided static analysis. It demonstrates good practices by implementing nonce checks and capability checks for its entry points. The absence of dangerous functions, file operations, and external HTTP requests further reduces its potential attack surface. The SQL query usage is also promising, with a significant percentage employing prepared statements, mitigating risks of SQL injection.

However, there are minor areas for concern. While the total number of entry points is low and none are reported as unprotected, the static analysis indicates potential for improvement in output escaping, with approximately a quarter of outputs not being properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is involved in these outputs.

The plugin's vulnerability history is a significant strength; the complete lack of recorded CVEs, particularly at critical or high severity levels, suggests a history of secure development and maintenance. This, combined with the static analysis findings, indicates a low overall risk for this version. The main weakness lies in the potential for unescaped output, which warrants attention.

Key Concerns

  • Unescaped output (26% of total)
Vulnerabilities
None known

Free Post Mail Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Free Post Mail Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
9 prepared
Unescaped Output
6
17 escaped
Nonce Checks
3
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

75% prepared12 total queries

Output Escaping

74% escaped23 total outputs
Attack Surface

Free Post Mail Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 2

authwp_ajax_free_post_mail_actionindex.php:46
noprivwp_ajax_free_post_mail_actionindex.php:47

Shortcodes 1

[free_post_mail_filed] index.php:45
WordPress Hooks 3
actionadmin_menuindex.php:41
actionmce_external_pluginsindex.php:42
actionadmin_enqueue_scriptsindex.php:43
Maintenance & Trust

Free Post Mail Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedSep 26, 2017
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs60
Developer Profile

Free Post Mail Developer Profile

MASAAKI

3 plugins · 10K total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
311 days
View full developer profile
Detection Fingerprints

How We Detect Free Post Mail

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/free-post-mail/css/free_post_mail.css/wp-content/plugins/free-post-mail/js/manage.js
Script Paths
/wp-content/plugins/free-post-mail/js/manage.js

HTML / DOM Fingerprints

CSS Classes
bulk-action-selector-top
Data Attributes
id="free_post_mail_id"id="insert_free_post_mail"
Shortcode Output
[free_post_mail_filed]
FAQ

Frequently Asked Questions about Free Post Mail