Mail via Resend Security & Risk Analysis

wordpress.org/plugins/mail-via-resend

Send WordPress emails via Resend. Includes email logging and management.

0 active installs v1.0.1 PHP 7.4+ WP 5.8+ Updated Dec 4, 2025
emailemail-loggingmailresendsmtp
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mail via Resend Safe to Use in 2026?

Generally Safe

Score 100/100

Mail via Resend has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The "mail-via-resend" v1.0.1 plugin exhibits a generally strong security posture, demonstrating good practices in several key areas. The code analysis reveals a high percentage of SQL queries using prepared statements and nearly all output being properly escaped, which are crucial for preventing common web vulnerabilities. Furthermore, the plugin incorporates a reasonable number of nonce and capability checks, and importantly, has no known unpatched vulnerabilities. The absence of shortcodes and REST API routes also limits potential attack vectors.

However, the static analysis did identify some areas of concern. Specifically, there are three AJAX handlers, none of which are protected by authentication checks, creating a potential attack surface. Additionally, the taint analysis flagged three flows with unsanitized paths, all of which are categorized as high severity. While these are not yet published vulnerabilities, they represent exploitable weaknesses within the plugin's code that could be leveraged by an attacker. The single file operation and two external HTTP requests, while not inherently insecure, should be monitored for any signs of vulnerability if they involve user-supplied input.

In conclusion, the plugin is built on a solid foundation with good security practices in place, and its clean vulnerability history is a positive sign. The primary weakness lies in the unprotected AJAX handlers and the high-severity taint flows with unsanitized paths. Addressing these specific code-level issues should be the immediate priority to further harden the plugin's security.

Key Concerns

  • Unprotected AJAX handlers present
  • High severity taint flows with unsanitized paths
Vulnerabilities
None known

Mail via Resend Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Mail via Resend Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
23 prepared
Unescaped Output
1
102 escaped
Nonce Checks
4
Capability Checks
6
File Operations
1
External Requests
2
Bundled Libraries
0

SQL Query Safety

92% prepared25 total queries

Output Escaping

99% escaped103 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

7 flows3 with unsanitized paths
process_bulk_action (includes\Admin\EmailLogPage.php:161)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Mail via Resend Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 3

authwp_ajax_resend_resend_emailincludes\Admin\EmailLogPage.php:338
authwp_ajax_resend_send_test_emailincludes\Admin\SettingsPage.php:47
authwp_ajax_resend_dismiss_noticeincludes\Admin\SettingsPage.php:48
WordPress Hooks 12
actionadmin_menuincludes\Admin\EmailLogPage.php:334
actionadmin_enqueue_scriptsincludes\Admin\EmailLogPage.php:335
actionadmin_enqueue_scriptsincludes\Admin\EmailLogPage.php:337
actionadmin_menuincludes\Admin\SettingsPage.php:44
actionadmin_initincludes\Admin\SettingsPage.php:45
actionadmin_noticesincludes\Admin\SettingsPage.php:46
actionadmin_enqueue_scriptsincludes\Admin\SettingsPage.php:49
actionphpmailer_initincludes\Hooks.php:51
filterphpmailer_pre_sendincludes\Hooks.php:55
actionresend_cleanup_old_logsincludes\Hooks.php:58
filterresend_bypass_mailerincludes\Mail\ResendMailer.php:603
actionwpmu_new_blogincludes\Plugin.php:76

Scheduled Events 1

resend_cleanup_old_logs
Maintenance & Trust

Mail via Resend Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 4, 2025
PHP min version7.4
Downloads151

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Mail via Resend Developer Profile

webscapenz

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mail via Resend

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mail-via-resend/assets/css/admin.css/wp-content/plugins/mail-via-resend/assets/js/admin.js
Script Paths
/wp-content/plugins/mail-via-resend/assets/js/admin.js
Version Parameters
mail-via-resend/assets/css/admin.css?ver=mail-via-resend/assets/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
resend-statusresend-status-successresend-status-error
Data Attributes
name="log_ids[]"
FAQ

Frequently Asked Questions about Mail via Resend