Mail To All Security & Risk Analysis

wordpress.org/plugins/mail-to-all-comment

You can easily send subscription,notification,newsletter,etc by email to your comments users under one post.

10 active installs v1.5.3 PHP + WP 3.0+ Updated Aug 17, 2016
commentsemailnewsletternotificationsubscribe
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mail To All Safe to Use in 2026?

Generally Safe

Score 85/100

Mail To All has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The mail-to-all-comment plugin v1.5.3 exhibits a mixed security posture. While the static analysis indicates a remarkably small attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events that are accessible without authentication, and a good percentage of SQL queries utilizing prepared statements, there are significant concerns regarding output escaping and taint analysis. A concerning 11% of outputs are properly escaped, suggesting a high likelihood of cross-site scripting (XSS) vulnerabilities. Furthermore, the taint analysis revealed two high-severity flows with unsanitized paths, indicating potential for sensitive data exposure or manipulation if these paths are reachable by an attacker. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive sign. However, this cannot fully mitigate the risks identified in the code analysis, particularly the unsanitized taint flows and poor output escaping practices. Overall, while the lack of historical vulnerabilities is encouraging, the identified code-level weaknesses require attention to improve the plugin's security.

Key Concerns

  • High severity taint flows with unsanitized paths
  • Low percentage of properly escaped output
  • No capability checks
  • No nonce checks
Vulnerabilities
None known

Mail To All Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Mail To All Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
6 prepared
Unescaped Output
8
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

86% prepared7 total queries

Output Escaping

11% escaped9 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
MTA_init_page (mail-to-all.php:51)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Mail To All Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuinc\leniy_admin_menu.php:23
actionadmin_menumail-to-all.php:37
actioncomment_formmail-to-all.php:364
filterpreprocess_commentmail-to-all.php:378
Maintenance & Trust

Mail To All Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedAug 17, 2016
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Mail To All Developer Profile

Leniy

3 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mail To All

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mail-to-all-comment/icon.png

HTML / DOM Fingerprints

CSS Classes
mtainitmtaupdatemtaupdatefail
HTML Comments
下面是初始化设置页面下面是邮件发送页面下面是关于页面
FAQ

Frequently Asked Questions about Mail To All