Mail to Users Security & Risk Analysis

wordpress.org/plugins/mail2users

Email to users about new posts and pages. Send custom emails. Email to users about latest woocommerce products. Emails privacy.

20 active installs v1.2 PHP + WP 3.6+ Updated Mar 27, 2017
email-usersnotify-userspost-email-notificationrole-emailuser-group-email
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mail to Users Safe to Use in 2026?

Generally Safe

Score 85/100

Mail to Users has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The mail2users v1.2 plugin exhibits a seemingly strong security posture based on the provided static analysis. The absence of any identified attack surface points (AJAX handlers, REST API routes, shortcodes, cron events) is a significant positive. Furthermore, the plugin demonstrates good practice by using prepared statements for all its SQL queries and not performing any file operations or external HTTP requests. The lack of recorded vulnerabilities in its history, including critical or high-severity ones, also suggests a history of stable security.

However, a major concern arises from the very low percentage of properly escaped output (8%). This indicates a high likelihood of cross-site scripting (XSS) vulnerabilities, as user-supplied data is likely being rendered directly into the HTML without adequate sanitization. While the taint analysis reported no unsanitized paths, this could be due to a limited scope of analysis or the XSS vulnerabilities being of a type not detected by the specific taint analysis tool used. The complete absence of nonce and capability checks is also a notable weakness, especially if any hidden functionalities exist that could be exploited without proper authorization. The overall lack of explicit security checks like nonces and capability checks leaves room for potential privilege escalation or unauthorized actions if any latent vulnerabilities exist.

In conclusion, while the plugin avoids common pitfalls like raw SQL, external requests, and a large attack surface, the severe lack of output escaping and missing authorization checks presents a significant risk. The absence of historical vulnerabilities is a positive, but it doesn't negate the immediate risks identified in the code analysis. The plugin's strengths lie in its limited integration points and clean SQL usage, but its weaknesses in output sanitization and authorization are critical security concerns that need immediate attention.

Key Concerns

  • Low output escaping percentage (8%)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Mail to Users Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Mail to Users Release Timeline

v1.2Current
v1.1
v1.0.8
v1.0.7
v1.0.6
v1.0.5
v1.0.4
v1.0.3
v1.0.2
v1.0.1
Code Analysis
Analyzed Mar 16, 2026

Mail to Users Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
57
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

8% escaped62 total outputs
Attack Surface

Mail to Users Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menumail2users.php:29
actionadmin_initmail2users.php:30
actionadmin_initmail2users.php:31
actionadd_meta_boxesmail2users.php:32
actionsave_postmail2users.php:33
actionadmin_initmail2users.php:34
actionadmin_initmail2users.php:35
Maintenance & Trust

Mail to Users Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.33
Last updatedMar 27, 2017
PHP min version
Downloads3K

Community Trust

Rating74/100
Number of ratings3
Active installs20
Developer Profile

Mail to Users Developer Profile

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mail to Users

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mail2users/assets/css/view.css
Script Paths
/wp-content/plugins/mail2users/assets/js/mail2users.js
Version Parameters
mail2users/assets/js/mail2users.js?ver=mail2users/assets/css/view.css?ver=

HTML / DOM Fingerprints

CSS Classes
mail2users-compose-section
Data Attributes
mail2users-editor-idmail2users-subjectmail2users-attachmentmail2users-ccmail2users-frommail2users_groups+1 more
FAQ

Frequently Asked Questions about Mail to Users