GamiPress – Conditional Emails Recipients Security & Risk Analysis

wordpress.org/plugins/gamipress-conditional-emails-recipients

Add custom recipients on conditional emails.

80 active installs v1.0.1 PHP + WP 4.4+ Updated Dec 1, 2025
conditionalemailgamificationgamipressrecipient
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GamiPress – Conditional Emails Recipients Safe to Use in 2026?

Generally Safe

Score 100/100

GamiPress – Conditional Emails Recipients has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The static analysis of the 'gamipress-conditional-emails-recipients' v1.0.1 plugin reveals an exceptionally clean codebase with no detected vulnerabilities or suspicious code patterns. The plugin demonstrates strong security practices by having zero detected entry points into the WordPress application that lack authentication or permission checks. Furthermore, the absence of dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, and critical taint flows indicates a well-developed and secure plugin.

The vulnerability history further reinforces this positive assessment. With zero known CVEs and no recorded vulnerabilities of any severity, the plugin has a clean track record. This lack of past issues suggests consistent developer attention to security or a low risk profile inherent to its functionality. The complete absence of any security-related findings across multiple analysis categories makes this plugin appear to be exceptionally secure.

In conclusion, based on the provided static analysis and vulnerability history, the 'gamipress-conditional-emails-recipients' v1.0.1 plugin exhibits an excellent security posture. The comprehensive lack of identified risks in the code and its pristine vulnerability record suggest a reliable and safe plugin to use. There are no apparent weaknesses or areas for concern based on this data.

Vulnerabilities
None known

GamiPress – Conditional Emails Recipients Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GamiPress – Conditional Emails Recipients Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

GamiPress – Conditional Emails Recipients Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_noticesgamipress-conditional-emails-recipients.php:101
actionplugins_loadedgamipress-conditional-emails-recipients.php:217
actioncmb2_admin_initincludes\admin.php:48
filtergamipress_conditional_emails_send_emailincludes\filters.php:63
Maintenance & Trust

GamiPress – Conditional Emails Recipients Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedDec 1, 2025
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs80
Developer Profile

GamiPress – Conditional Emails Recipients Developer Profile

Ruben Garcia

30 plugins · 25K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
139 days
View full developer profile
Detection Fingerprints

How We Detect GamiPress – Conditional Emails Recipients

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gamipress-conditional-emails-recipients/includes/admin.php/wp-content/plugins/gamipress-conditional-emails-recipients/includes/filters.php

HTML / DOM Fingerprints

Data Attributes
_gamipress_conditional_emails_recipients_recipients
FAQ

Frequently Asked Questions about GamiPress – Conditional Emails Recipients