Mail Subscribe List Security & Risk Analysis

wordpress.org/plugins/mail-subscribe-list

Simple customizable plugin that displays a name/email form where visitors can submit their information, manageable in the WordPress admin.

4K active installs v2.1.10 PHP + WP 3.0+ Updated Aug 8, 2023
emaillistmailnewslettersubscribe
55
C · Use Caution
CVEs total5
Unpatched1
Last CVESep 22, 2025
Safety Verdict

Is Mail Subscribe List Safe to Use in 2026?

Use With Caution

Score 55/100

Mail Subscribe List has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

5 known CVEs 1 unpatched Last CVE: Sep 22, 2025Updated 2yr ago
Risk Assessment

The "mail-subscribe-list" plugin version 2.1.10 exhibits a mixed security posture. On the positive side, the static analysis reveals good coding practices, with a high percentage of SQL queries using prepared statements and output properly escaped. The attack surface is also relatively small and appears to have limited unprotected entry points based on the provided data. Nonce and capability checks are present, which are crucial for securing WordPress functionalities.

However, the plugin's history of known vulnerabilities is a significant concern. The presence of 5 known CVEs, with 1 currently unpatched and categorized as high severity, indicates a recurring pattern of security weaknesses. The historical vulnerability types, including Cross-Site Scripting and Cross-Site Request Forgery, suggest potential issues with how user input is handled and processed, which could be exploited if not thoroughly addressed.

In conclusion, while the current static analysis shows some adherence to security best practices, the plugin's past vulnerability history, particularly the unpatched high-severity issue, poses a substantial risk. Users should be cautious, and immediate attention should be given to addressing the outstanding vulnerability. Further investigation into the root cause of past vulnerabilities is recommended to prevent future occurrences.

Key Concerns

  • Unpatched high severity vulnerability
  • History of medium severity vulnerabilities
  • History of cross-site scripting vulnerabilities
  • History of cross-site request forgery vulnerabilities
Vulnerabilities
5

Mail Subscribe List Security Vulnerabilities

CVEs by Year

1 CVE in 2014
2014
2 CVEs in 2022
2022
1 CVE in 2023
2023
1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

High
1
Medium
4

5 total CVEs

CVE-2025-58018medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Mail Subscribe List <= 2.1.10 - Authenticated (Contributor+) Stored Cross-Site Scripting

Sep 22, 2025Unpatched
CVE-2023-23657medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Mail Subscribe List <= 2.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via smlsubform shortcode

Apr 20, 2023 Patched in 2.1.10 (278d)
WF-75424878-5976-4dc6-8a09-8eb46a7425b8-mail-subscribe-listmedium · 5.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Mail Subscribe List <= 2.1.6 - Stored Cross-Site Scripting

May 26, 2022 Patched in 2.1.7 (607d)
CVE-2022-1603high · 8.8Cross-Site Request Forgery (CSRF)

Mail Subscribe List <= 2.1.3 - Cross-Site Request Forgery

May 26, 2022 Patched in 2.1.4 (607d)
CVE-2013-10026medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Mail Subscribe List <= 2.0.9 - Unauthenticated Stored Cross-Site Scripting

Aug 1, 2014 Patched in 2.1 (3462d)
Code Analysis
Analyzed Mar 16, 2026

Mail Subscribe List Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
11 prepared
Unescaped Output
7
57 escaped
Nonce Checks
1
Capability Checks
2
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

85% prepared13 total queries

Output Escaping

89% escaped64 total outputs
Data Flows
All sanitized

Data Flow Analysis

3 flows
<index> (index.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Mail Subscribe List Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[smlsubform] sml.php:97
WordPress Hooks 3
actionadmin_menusml.php:58
actionadmin_initsml.php:59
filterwidget_textsml.php:100
Maintenance & Trust

Mail Subscribe List Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedAug 8, 2023
PHP min version
Downloads184K

Community Trust

Rating88/100
Number of ratings60
Active installs4K
Developer Profile

Mail Subscribe List Developer Profile

Richard Leishman

3 plugins · 4K total installs

62
trust score
Avg Security Score
75/100
Avg Patch Time
1239 days
View full developer profile
Detection Fingerprints

How We Detect Mail Subscribe List

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mail-subscribe-list/sml-subscribe-form.css/wp-content/plugins/mail-subscribe-list/sml-subscribe-form.js

HTML / DOM Fingerprints

CSS Classes
sml_subscribesml_hiddenfieldprependsml_thankyousml_namesml_namelabelsml_nameinputsml_email+16 more
Data Attributes
data-sml_subscribe_widget_shownamedata-sml_subscribe_widget_nametxtdata-sml_subscribe_widget_nameholderdata-sml_subscribe_widget_emailtxtdata-sml_subscribe_widget_emailholderdata-sml_subscribe_widget_showsubmit+1 more
JS Globals
window.onload
Shortcode Output
<form class="sml_subscribe"<input class="sml_hiddenfield" name="sml_subscribe"<p class="sml_thankyou"><label class="sml_namelabel"
FAQ

Frequently Asked Questions about Mail Subscribe List