Geek Mail Whitelist Security & Risk Analysis

wordpress.org/plugins/geek-mail-whitelist

Allow users with certain emails to register to your WordPress site by adding whitelist rules.

0 active installs v1.0.0 PHP + WP 3.9+ Updated Unknown
emailemail-whitelistregistrationspam
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Geek Mail Whitelist Safe to Use in 2026?

Generally Safe

Score 100/100

Geek Mail Whitelist has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The geek-mail-whitelist v1.0.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any recorded CVEs, coupled with the fact that all SQL queries utilize prepared statements and a high percentage of outputs are properly escaped, indicates good development practices. Furthermore, the limited attack surface of only two AJAX handlers, both of which are noted as unprotected, is a positive sign, though the lack of explicit authorization checks on these handlers is a point of concern that could be exploited by an attacker if they can trigger these AJAX actions. The taint analysis also found no critical or high severity vulnerabilities, suggesting that the plugin is not susceptible to common injection attacks through the analyzed code flows.

Despite the overall positive findings, the two unprotected AJAX handlers represent a potential risk. While the total attack surface is small, an attacker could potentially exploit these entry points if they can be triggered without proper authentication or authorization. The lack of capability checks on these handlers, while not explicitly flagged as a deduction in this analysis (as the provided data focuses on specific vulnerabilities), is a critical security practice that is missing. The vulnerability history being completely clear is a significant strength, implying a well-maintained and secure codebase over time. In conclusion, the plugin is strong in its handling of data and its vulnerability history, but the unprotected AJAX endpoints warrant attention to ensure proper access control.

Key Concerns

  • Unprotected AJAX handlers
Vulnerabilities
None known

Geek Mail Whitelist Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Geek Mail Whitelist Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
7 prepared
Unescaped Output
3
22 escaped
Nonce Checks
4
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared7 total queries

Output Escaping

88% escaped25 total outputs
Data Flows
All sanitized

Data Flow Analysis

3 flows
addRule (backend\actions.php:46)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Geek Mail Whitelist Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_gmw_enablebackend\actions.php:6
authwp_ajax_gmw_delbackend\actions.php:7
Maintenance & Trust

Geek Mail Whitelist Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.0
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Geek Mail Whitelist Developer Profile

gongwan33

3 plugins · 10 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Geek Mail Whitelist

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/geek-mail-whitelist/css/gmw-admin-style.css/wp-content/plugins/geek-mail-whitelist/css/gmw-frontend-style.css/wp-content/plugins/geek-mail-whitelist/js/gmw-admin-script.js/wp-content/plugins/geek-mail-whitelist/js/gmw-frontend-script.js
Script Paths
/wp-content/plugins/geek-mail-whitelist/js/gmw-admin-script.js/wp-content/plugins/geek-mail-whitelist/js/gmw-frontend-script.js
Version Parameters
geek-mail-whitelist/css/gmw-admin-style.css?ver=geek-mail-whitelist/css/gmw-frontend-style.css?ver=geek-mail-whitelist/js/gmw-admin-script.js?ver=geek-mail-whitelist/js/gmw-frontend-script.js?ver=

HTML / DOM Fingerprints

CSS Classes
gmw-admin-wrappergmw-frontend-form
HTML Comments
<!-- Geek Mail Whitelist plugin --><!-- GMW Admin notices -->
Data Attributes
data-gmw-ajax-url
JS Globals
GMW_Admin_ScriptsGMW_Frontend_Scripts
REST Endpoints
/wp-json/geek-mail-whitelist/v1/settings
Shortcode Output
[gmw_whitelist_form]
FAQ

Frequently Asked Questions about Geek Mail Whitelist