Full Detail From Email Security & Risk Analysis

wordpress.org/plugins/full-detail-from-email

Using the Full Detail From Email with just an emai address you get all required and available information about subscriber.

0 active installs v2.2.5 PHP + WP 3.7+ Updated Jun 18, 2020
all-details-from-emaildetail-from-emailsubscribers-all-detailsuser-ip-address
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Full Detail From Email Safe to Use in 2026?

Generally Safe

Score 85/100

Full Detail From Email has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The 'full-detail-from-email' v2.2.5 plugin exhibits significant security concerns, primarily stemming from its unprotected entry points and insecure handling of user-supplied data. With two AJAX handlers lacking authentication checks and a critical taint flow involving unsanitized paths, the plugin presents a substantial risk for attackers to potentially inject malicious code or manipulate data. The presence of the 'unserialize' function, especially without clear input validation or sanitization mechanisms, is a known vector for serious vulnerabilities. While the plugin has no recorded CVEs, this does not guarantee its current safety, as the static analysis reveals fundamental security weaknesses that could lead to undiscovered vulnerabilities.

The plugin's vulnerability history is currently clean, which is a positive sign. However, this lack of recorded history should not overshadow the critical findings in the static analysis. The substantial number of flows with unsanitized paths, particularly four designated as high severity, strongly indicates potential for exploitation. The limited use of prepared statements for SQL queries and the low percentage of properly escaped output further amplify these concerns, suggesting that data injected through the unprotected entry points could be used to compromise the database or lead to cross-site scripting (XSS) vulnerabilities. The absence of nonce and capability checks on its AJAX endpoints is a direct invitation for unauthorized actions.

In conclusion, while the absence of known vulnerabilities is a positive aspect, the 'full-detail-from-email' v2.2.5 plugin has a poor security posture due to critical vulnerabilities identified in the static analysis. The unprotected AJAX handlers, high-severity unsanitized taint flows, use of 'unserialize' without apparent sanitization, and weak SQL and output escaping practices create significant risks. It is strongly recommended that this plugin be audited and updated by its developers to address these critical security flaws before it can be considered safe for use.

Key Concerns

  • Unprotected AJAX handlers
  • High severity taint flows
  • Dangerous function: unserialize
  • Low percentage of prepared SQL statements
  • Low percentage of properly escaped output
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Full Detail From Email Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Full Detail From Email Code Analysis

Dangerous Functions
1
Raw SQL Queries
8
4 prepared
Unescaped Output
19
16 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$detail = unserialize($details);full-detail-from-email.php:316

SQL Query Safety

33% prepared12 total queries

Output Escaping

46% escaped35 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
<functions> (admin\includes\functions.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Full Detail From Email Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

authwp_ajax_skyfdfe_user_formfull-detail-from-email.php:232
noprivwp_ajax_skyfdfe_user_formfull-detail-from-email.php:233

Shortcodes 1

[skyfdfe_email] full-detail-from-email.php:228
WordPress Hooks 4
actionadmin_enqueue_scriptsfull-detail-from-email.php:36
actionwp_enqueue_scriptsfull-detail-from-email.php:49
actionadmin_menufull-detail-from-email.php:59
actionadmin_initfull-detail-from-email.php:79
Maintenance & Trust

Full Detail From Email Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedJun 18, 2020
PHP min version
Downloads824

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Full Detail From Email Developer Profile

Skywave Info Solutions

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Full Detail From Email

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/full-detail-from-email/admin/assets/css/style.css/wp-content/plugins/full-detail-from-email/admin/assets/js/skyfdfe.js/wp-content/plugins/full-detail-from-email/admin/assets/js/bootstrap.min.js/wp-content/plugins/full-detail-from-email/public/assets/css/skyfdfe-style.css/wp-content/plugins/full-detail-from-email/public/assets/skyfdfe-public.js
Script Paths
/wp-content/plugins/full-detail-from-email/admin/assets/js/skyfdfe.js/wp-content/plugins/full-detail-from-email/admin/assets/js/bootstrap.min.js/wp-content/plugins/full-detail-from-email/public/assets/skyfdfe-public.js
Version Parameters
full-detail-from-email/admin/assets/js/skyfdfe.js?ver=full-detail-from-email/admin/assets/js/bootstrap.min.js?ver=full-detail-from-email/public/assets/css/skyfdfe-style.css?ver=full-detail-from-email/public/assets/skyfdfe-public.js?ver=

HTML / DOM Fingerprints

CSS Classes
row
Data Attributes
id="full_contact_api_key"name="full_contact_api_key"id="full_contact_ip_token"name="full_contact_ip_token"
JS Globals
skyfdfe_ajax_objectskyfdfe_ajax
Shortcode Output
[skyfdfe_email]
FAQ

Frequently Asked Questions about Full Detail From Email