Mail Me In – Magic Link Login for WooCommerce Security & Risk Analysis

wordpress.org/plugins/mail-me-in-magic-link-login-for-woocommerce

Secure magic link login for WordPress. Users login via email links—no passwords needed.

0 active installs v1.0 PHP 7.4+ WP 6.0+ Updated May 17, 2025
authenticationemailmagic-linkpasswordlesswoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mail Me In – Magic Link Login for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

Mail Me In – Magic Link Login for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10mo ago
Risk Assessment

This plugin exhibits a generally good security posture based on the provided static analysis. It utilizes prepared statements for all SQL queries and a good majority of its output is properly escaped, minimizing risks of SQL injection and cross-site scripting. The absence of dangerous functions, file operations, and external HTTP requests further strengthens its security. Importantly, there are no known past or current vulnerabilities associated with this plugin, suggesting a history of secure development or minimal public exposure of any potential weaknesses.

However, the analysis does highlight a couple of areas that could be improved. While the plugin has a small attack surface with only two AJAX handlers, the lack of explicit capability checks on these handlers is a notable concern. This means that any authenticated user, regardless of their role or permissions, could potentially trigger these AJAX actions. Although no unsanitized paths were found in taint analysis, this lack of capability checks could become a vector for privilege escalation if the AJAX actions perform sensitive operations. The presence of nonce checks on these handlers is positive, but they only protect against CSRF and not unauthorized access based on user roles.

In conclusion, the plugin is built on a foundation of secure coding practices regarding data handling. The primary weakness lies in the absence of granular access control on its AJAX endpoints. While there's no current vulnerability history, addressing the capability checks would significantly enhance its overall security and resilience against potential future exploits.

Key Concerns

  • AJAX handlers missing capability checks
  • 67% of output escaped, not 100%
Vulnerabilities
None known

Mail Me In – Magic Link Login for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Mail Me In – Magic Link Login for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
2
4 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

67% escaped6 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
mail_me_in_handle_token_login (mail-me-in.php:60)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Mail Me In – Magic Link Login for WooCommerce Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_mail_me_in_send_linkmail-me-in.php:151
noprivwp_ajax_mail_me_in_send_linkmail-me-in.php:152
WordPress Hooks 5
actionplugins_loadedmail-me-in.php:27
actioninitmail-me-in.php:58
actionmail_me_in_cleanup_tokensmail-me-in.php:123
actionwoocommerce_after_customer_login_formmail-me-in.php:149
actionwp_enqueue_scriptsmail-me-in.php:150

Scheduled Events 1

mail_me_in_cleanup_tokens
Maintenance & Trust

Mail Me In – Magic Link Login for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedMay 17, 2025
PHP min version7.4
Downloads287

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Mail Me In – Magic Link Login for WooCommerce Developer Profile

Amzil Ayoub

6 plugins · 30 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mail Me In – Magic Link Login for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mail-me-in-magic-link-login-for-woocommerce/assets/css/mail-me-in.css/wp-content/plugins/mail-me-in-magic-link-login-for-woocommerce/assets/js/mail-me-in.js
Script Paths
/wp-content/plugins/mail-me-in-magic-link-login-for-woocommerce/assets/js/mail-me-in.js
Version Parameters
mail-me-in-magic-link-login-for-woocommerce/assets/css/mail-me-in.css?ver=mail-me-in-magic-link-login-for-woocommerce/assets/js/mail-me-in.js?ver=

HTML / DOM Fingerprints

CSS Classes
mail-me-in-optionmail-me-in-popupmail-me-in-popup-contentmail-me-in-formmail-me-in-form-group
Data Attributes
id="mail-me-in-trigger"id="mail-me-in-popup"id="mail-me-in-popup-content"id="mail-me-in-form"id="mail-me-in-email"
JS Globals
mail_me_in_vars
FAQ

Frequently Asked Questions about Mail Me In – Magic Link Login for WooCommerce