Mailbul Security & Risk Analysis

wordpress.org/plugins/mailbul

Automatically import your WordPress users' emails to your contact list on Mailbul.

0 active installs v1.0.1 PHP + WP 3.0+ Updated Jun 8, 2017
autorespondersdigital-marketingemail-campaignemail-marketinginterspire
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Mailbul Safe to Use in 2026?

Generally Safe

Score 85/100

Mailbul has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The mailbul plugin v1.0.1 presents a generally good security posture with no known historical vulnerabilities. The static analysis reveals a remarkably small attack surface with zero identified entry points, which is a strong indicator of careful development. Furthermore, the complete absence of dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), file operations, and critical/high severity taint flows are all positive signs. However, there are areas for improvement. The relatively low percentage of properly escaped output (47%) suggests a risk of cross-site scripting (XSS) vulnerabilities. While nonce and capability checks are present, their limited application (only one of each) on the overall plugin functionality needs further investigation. The presence of two external HTTP requests without further context also warrants scrutiny to ensure they are not introducing new attack vectors. Overall, the plugin is built on a solid foundation, but the insufficient output escaping is a notable concern that could lead to security issues.

Key Concerns

  • Low percentage of properly escaped output
  • Limited nonce checks
  • Limited capability checks
  • External HTTP requests without context
Vulnerabilities
None known

Mailbul Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Mailbul Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Mailbul Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
7 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

47% escaped15 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

1 flows
<mailbul_admin> (files\mailbul_admin.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Mailbul Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menumailbul.php:46
actionuser_registermailbul.php:49
Maintenance & Trust

Mailbul Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJun 8, 2017
PHP min version
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Mailbul Developer Profile

mailbul

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mailbul

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mailbul/files/lib/img/mailbul.png

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Mailbul