Mailster MailerSend Integration Security & Risk Analysis

wordpress.org/plugins/mailster-mailersend

Uses MailerSend to deliver emails for the Mailster Newsletter Plugin for WordPress.

200 active installs v1.1.3 PHP + WP 6.0+ Updated May 27, 2024
deliverymethodmailersendmailstermailsterespnewsletter
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mailster MailerSend Integration Safe to Use in 2026?

Generally Safe

Score 92/100

Mailster MailerSend Integration has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "mailster-mailersend" plugin, in version 1.1.3, demonstrates a generally good security posture based on the provided static analysis and vulnerability history. The absence of known CVEs and the consistent use of prepared statements for SQL queries are strong indicators of robust development practices. Furthermore, the low percentage of unescaped output and the limited file operations suggest an effort to mitigate common vulnerabilities. However, there are areas that warrant attention. The complete lack of nonce checks and capability checks across all identified entry points, despite having a cron event, presents a significant risk. This absence means that actions triggered by the cron event, or any other potential future entry point, could be executed without proper authorization or validation, leaving the plugin vulnerable to unauthorized actions.

The taint analysis showing zero flows with unsanitized paths is positive, indicating that the plugin is not currently exposing itself to common injection vulnerabilities through data flow. The limited attack surface reported (0 AJAX, 0 REST API, 0 shortcodes) is also a strength, reducing the overall potential for exploitation. However, the presence of a cron event without associated security checks introduces a potential avenue for abuse. While there are no recorded historical vulnerabilities, this doesn't guarantee future safety. The lack of explicit security checks on the existing cron event is a tangible weakness that should be addressed to solidify the plugin's security.

Key Concerns

  • Missing nonce checks on entry points
  • Missing capability checks on entry points
  • Unescaped output detected
Vulnerabilities
None known

Mailster MailerSend Integration Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Mailster MailerSend Integration Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
10 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
1
Bundled Libraries
0

Output Escaping

83% escaped12 total outputs
Attack Surface

Mailster MailerSend Integration Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actioninitclasses\mailersend.class.php:23
actionadmin_noticesclasses\mailersend.class.php:37
filtermailster_delivery_methodsclasses\mailersend.class.php:41
actionmailster_deliverymethod_tab_mailersendclasses\mailersend.class.php:42
filtermailster_verify_optionsclasses\mailersend.class.php:44
actionmailster_initsendclasses\mailersend.class.php:47
actionmailster_presendclasses\mailersend.class.php:48
actionmailster_dosendclasses\mailersend.class.php:49
actionmailster_section_tab_bounceclasses\mailersend.class.php:50
filtermailster_subscriber_errorsclasses\mailersend.class.php:51

Scheduled Events 1

mailster_mailersend_cron
Maintenance & Trust

Mailster MailerSend Integration Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 27, 2024
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs200
Developer Profile

Mailster MailerSend Integration Developer Profile

EverPress

28 plugins · 121K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
255 days
View full developer profile
Detection Fingerprints

How We Detect Mailster MailerSend Integration

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mailster-mailersend/assets/css/mailster-mailersend.css/wp-content/plugins/mailster-mailersend/assets/js/mailster-mailersend.js
Script Paths
/wp-content/plugins/mailster-mailersend/assets/js/mailster-mailersend.js
Version Parameters
mailster-mailersend/assets/css/mailster-mailersend.css?ver=1.1.3mailster-mailersend/assets/js/mailster-mailersend.js?ver=1.1.3

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Mailster MailerSend Integration