Mail Debug Security & Risk Analysis

wordpress.org/plugins/mail-debug

Redirects all email sent through wordpress to the user currently logged in or the site administrator.

10 active installs v1.4 PHP + WP 2.7+ Updated Jul 20, 2010
debugdevelopmentemailphpmailerwp_mail
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mail Debug Safe to Use in 2026?

Generally Safe

Score 85/100

Mail Debug has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The mail-debug plugin v1.4 exhibits a strong security posture based on the static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. The code further demonstrates good practices by utilizing prepared statements for all SQL queries and ensuring 100% of output is properly escaped. The presence of one capability check, although its scope isn't detailed, is a positive sign. The vulnerability history is also clean, with no recorded CVEs, indicating a stable and secure development past. This plugin appears to be designed with security in mind, minimizing potential entry points for attackers and implementing essential security measures within its code. There are no identified critical or high-severity issues from the taint analysis, further reinforcing its secure design. The lack of external HTTP requests and file operations also reduces the potential for certain types of vulnerabilities.

Despite the excellent static analysis and clean vulnerability history, the data provided does not offer a complete picture. The "0 total entry points" and "0 without auth checks" is highly unusual and suggests that either the plugin has no user-facing functionality or that the static analysis tool might not have identified all potential entry points. The "0 nonce checks" on the limited entry points is a minor concern, as nonces are a standard WordPress security practice, although their absence might be acceptable if there are genuinely no sensitive operations performed via these (hypothetical) entry points. The absence of any recorded vulnerabilities across its history is a significant strength, but ongoing vigilance and regular security audits are always recommended for any software.

Key Concerns

  • No nonce checks on entry points
Vulnerabilities
None known

Mail Debug Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Mail Debug Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Mail Debug Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actioninitmail-debug.php:32
actionphpmailer_initmail-debug.php:39
actionadmin_initmail-debug.php:134
actionplugin_action_linksmail-debug.php:140
actionadmin_menumail-debug.php:148
Maintenance & Trust

Mail Debug Maintenance & Trust

Maintenance Signals

WordPress version tested2.7.1
Last updatedJul 20, 2010
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Mail Debug Developer Profile

Ben

2 plugins · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mail Debug

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="mail_debug_adminonly"id="mail_debug_adminonly"name="mail_debug_redirect_to"id="mail_debug_redirect_to_currentuser"id="mail_debug_redirect_to_admin"id="mail_debug_redirect_to_siteadmin"
FAQ

Frequently Asked Questions about Mail Debug