GF Upload to Email Attachment Security & Risk Analysis

wordpress.org/plugins/gf-upload-to-email-attachment

This allows you to create a notification in gravity forms of an email that would send with the files being uploaded by that form as an attachment.

600 active installs v2.3.2 PHP + WP 4.2.2+ Updated Mar 11, 2020
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GF Upload to Email Attachment Safe to Use in 2026?

Generally Safe

Score 85/100

GF Upload to Email Attachment has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "gf-upload-to-email-attachment" v2.3.2 plugin exhibits a strong security posture. The absence of any identified entry points like AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code analysis reveals no dangerous functions, all SQL queries are prepared, and output is properly escaped, indicating adherence to secure coding practices. The lack of any recorded vulnerabilities, past or present, is a highly positive indicator of the plugin's reliability and security. The plugin also does not bundle any external libraries, which can sometimes introduce vulnerabilities if they are outdated or have known exploits.

While the static analysis shows zero total flows and zero flows with unsanitized paths, it's important to note that the scope of the taint analysis might be limited if there are no complex data flows or user-controllable inputs processed. The presence of file operations, though not flagged as a direct risk in this analysis, warrants careful consideration in a broader security review, as improper handling can lead to vulnerabilities. The lack of nonce and capability checks on any identified entry points is not a concern here because there are no entry points identified at all.

In conclusion, this plugin appears to be very secure based on the data. Its minimal attack surface, clean code signals regarding SQL and output handling, and a complete absence of vulnerability history are significant strengths. The primary area for potential, though unconfirmed, concern would be the precise implementation of the file operations if they involve user-supplied data, but without further information, this remains speculative. Overall, the plugin demonstrates a strong commitment to security.

Vulnerabilities
None known

GF Upload to Email Attachment Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GF Upload to Email Attachment Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0
Attack Surface

GF Upload to Email Attachment Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filtergform_notificationgf-upload-to-email-attachment.php:12
filtergform_confirmationgf-upload-to-email-attachment.php:60
filtergform_notification_ui_settingsgf-upload-to-email-attachment.php:124
filtergform_pre_notification_savegf-upload-to-email-attachment.php:141
Maintenance & Trust

GF Upload to Email Attachment Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedMar 11, 2020
PHP min version
Downloads15K

Community Trust

Rating98/100
Number of ratings11
Active installs600
Alternatives

GF Upload to Email Attachment Alternatives

No alternatives data available yet.

Developer Profile

GF Upload to Email Attachment Developer Profile

WP CMS Ninja

4 plugins · 680 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
9 days
View full developer profile
Detection Fingerprints

How We Detect GF Upload to Email Attachment

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gf-upload-to-email-attachment/gf-upload-to-email-attachment.php

HTML / DOM Fingerprints

Data Attributes
name="gfu_attach_upload_to_email"name="gfu_zip_attachment"name="gfu_delete_files"for="gfu_attach_upload_to_email"for="gfu_zip_attachment"for="gfu_delete_files"
FAQ

Frequently Asked Questions about GF Upload to Email Attachment