Gmail SMTP Security & Risk Analysis

wordpress.org/plugins/gmail-smtp

Connect to Gmail SMTP server to automatically send email from your WordPress site. Configure wp_mail() to use SMTP with OAuth 2.0 authentication.

10K active installs v1.2.3.18 PHP 5.6+ WP 6.9+ Updated Feb 19, 2026
emailgmailmailoauthsmtp
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Gmail SMTP Safe to Use in 2026?

Generally Safe

Score 100/100

Gmail SMTP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "gmail-smtp" plugin v1.2.3.18 demonstrates a generally strong security posture based on the static analysis. The absence of direct attack surface vectors like unprotected AJAX handlers, REST API routes, or shortcodes is a significant positive. Furthermore, the plugin exclusively uses prepared statements for SQL queries, indicating good database interaction practices. A high percentage of output is properly escaped, and nonce and capability checks are present, though not universally applied to all potential entry points (which are zero in this analysis). The presence of bundled libraries PHPMailer and Guzzle warrants careful attention regarding their versions and any known vulnerabilities associated with them, as this is a potential indirect risk.

The taint analysis shows no critical or high-severity flows with unsanitized paths, which is excellent. The vulnerability history being completely clear of CVEs is a strong indicator of the plugin's stability and the developers' attention to security. However, the lack of any recorded vulnerabilities, while positive, can also sometimes mean less rigorous historical security auditing or that the plugin hasn't been a prominent target. The file operations and external HTTP requests, while limited, are points to monitor for potential side-channel risks if not carefully implemented. Overall, the plugin appears to be developed with security in mind, but the reliance on bundled libraries is a key area for continued vigilance.

Key Concerns

  • Bundled libraries (PHPMailer, Guzzle)
Vulnerabilities
None known

Gmail SMTP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Gmail SMTP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
51 escaped
Nonce Checks
3
Capability Checks
2
File Operations
2
External Requests
1
Bundled Libraries
2

Bundled Libraries

PHPMailerGuzzle

Output Escaping

82% escaped62 total outputs
Data Flows
All sanitized

Data Flow Analysis

3 flows
revoke_access_settings (main.php:267)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Gmail SMTP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionplugins_loadedmain.php:54
actionadmin_menumain.php:55
actionadmin_enqueue_scriptsmain.php:56
actioninitmain.php:57
actionadmin_noticesmain.php:58
filterpre_wp_mailmain.php:60
filterplugin_action_linksmain.php:75
Maintenance & Trust

Gmail SMTP Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 19, 2026
PHP min version5.6
Downloads722K

Community Trust

Rating82/100
Number of ratings101
Active installs10K
Developer Profile

Gmail SMTP Developer Profile

Noor Alam

25 plugins · 157K total installs

75
trust score
Avg Security Score
94/100
Avg Patch Time
450 days
View full developer profile
Detection Fingerprints

How We Detect Gmail SMTP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gmail-smtp/addons/gmail-smtp-addons.css

HTML / DOM Fingerprints

CSS Classes
nav-tab-wrappernav-tabnav-tab-active
Data Attributes
data-settings_nonce
FAQ

Frequently Asked Questions about Gmail SMTP