Freshjet Security & Risk Analysis

wordpress.org/plugins/freshjet

Send email through wp_mail() but super-powered by Mailjet transactional email. This plugin is probably the most convenient way to use Mailjet transact …

100 active installs v0.6.6 PHP 7.2+ WP 5.2+ Updated Aug 24, 2021
freshjetmailjetsmtp-emailtransactional-emailwp_mail-smtp
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Freshjet Safe to Use in 2026?

Generally Safe

Score 85/100

Freshjet has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

Based on the static analysis, the Freshjet plugin v0.6.6 exhibits a seemingly strong security posture. The absence of dangerous functions, the use of prepared statements for all SQL queries, and the 100% proper output escaping are excellent practices. Furthermore, the lack of any recorded vulnerabilities, including CVEs, suggests a history of secure development or a lack of prior scrutiny. The plugin also demonstrates a minimal attack surface, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. However, the presence of file operations and external HTTP requests, while not inherently problematic, warrants further investigation to ensure these actions are handled securely and are not exploitable. The bundling of Guzzle, a third-party library, also introduces a potential dependency risk if it's not kept up-to-date, although its version is not specified. The complete lack of capability checks and nonce checks on any potential entry points is a significant concern, as it implies that any code executed within these (even if currently zero) would be accessible without proper authorization checks.

Key Concerns

  • Missing capability checks on entry points
  • Missing nonce checks on entry points
  • Bundled library Guzzle without version information
Vulnerabilities
None known

Freshjet Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Freshjet Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
28 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
2
Bundled Libraries
1

Bundled Libraries

Guzzle

Output Escaping

100% escaped28 total outputs
Attack Surface

Freshjet Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initclass-compatibility.php:25
actionadmin_headclass-setup.php:30
actionadmin_menuclass-setup.php:31
actionadmin_initclass-setup.php:32
actionadmin_enqueue_scriptsclass-setup.php:33
Maintenance & Trust

Freshjet Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedAug 24, 2021
PHP min version7.2
Downloads11K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

Freshjet Developer Profile

freshforcesbd

2 plugins · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Freshjet

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/freshjet/assets/css/settings.css/wp-content/plugins/freshjet/assets/js/settings.js
Script Paths
/wp-content/plugins/freshjet/vendor/autoload.php/wp-content/plugins/freshjet/autoload.php

HTML / DOM Fingerprints

CSS Classes
freshjet-keysfreshjet-keys-sectionfreshjet-sender-sectionfreshjet-template-sectionfreshjet-public-key-fieldfreshjet-secret-key-fieldfreshjet-sender-name-fieldfreshjet-sender-email-field+2 more
Data Attributes
name="freshjet_options[public_key]"name="freshjet_options[secret_key]"name="freshjet_options[sender_name]"name="freshjet_options[sender_email]"name="freshjet_options[template_id]"
FAQ

Frequently Asked Questions about Freshjet