Mailster Mailjet Security & Risk Analysis

wordpress.org/plugins/mailster-mailjet

Uses Mailjet to deliver emails for the Mailster Newsletter Plugin for WordPress.

300 active installs v1.1.2 PHP + WP 6.0+ Updated May 27, 2024
deliverymethodmailjetmailstermailsterespnewsletter
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mailster Mailjet Safe to Use in 2026?

Generally Safe

Score 92/100

Mailster Mailjet has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin "mailster-mailjet" v1.1.2 exhibits a generally strong security posture based on the static analysis. There are no identified AJAX handlers, REST API routes, or shortcodes that could serve as direct entry points for attackers. The absence of dangerous functions and the exclusive use of prepared statements for SQL queries further indicate good coding practices. A high percentage of output is properly escaped, mitigating the risk of cross-site scripting (XSS) vulnerabilities. The vulnerability history being entirely clear of known CVEs is a significant positive indicator of the plugin's overall security. However, the lack of nonce checks and capability checks across any entry points, coupled with the presence of file operations and external HTTP requests without explicit mention of sanitization or authentication, represents potential areas for concern. The sole cron event also warrants careful review to ensure its execution is secure and not exploitable. Despite these minor points of caution, the plugin appears to be well-maintained and robustly coded from a security perspective.

Key Concerns

  • Missing nonce checks on potential entry points
  • Missing capability checks on potential entry points
  • File operations present without context
  • External HTTP requests present without context
Vulnerabilities
None known

Mailster Mailjet Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Mailster Mailjet Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
1
Bundled Libraries
0

Output Escaping

92% escaped13 total outputs
Attack Surface

Mailster Mailjet Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actioninitclasses\mailjet.class.php:21
actionadmin_noticesclasses\mailjet.class.php:35
filtermailster_delivery_methodsclasses\mailjet.class.php:39
actionmailster_deliverymethod_tab_mailjetclasses\mailjet.class.php:40
filtermailster_verify_optionsclasses\mailjet.class.php:42
actionmailster_initsendclasses\mailjet.class.php:45
actionmailster_presendclasses\mailjet.class.php:46
actionmailster_dosendclasses\mailjet.class.php:47
actionmailster_section_tab_bounceclasses\mailjet.class.php:48
filtermailster_subscriber_errorsclasses\mailjet.class.php:49

Scheduled Events 1

mailster_mailjet_cron
Maintenance & Trust

Mailster Mailjet Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 27, 2024
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs300
Developer Profile

Mailster Mailjet Developer Profile

EverPress

28 plugins · 121K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
255 days
View full developer profile
Detection Fingerprints

How We Detect Mailster Mailjet

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mailster-mailjet/assets/css/mailster-mailjet-admin.css/wp-content/plugins/mailster-mailjet/assets/js/mailster-mailjet-admin.js
Script Paths
/wp-content/plugins/mailster-mailjet/assets/js/mailster-mailjet-admin.js
Version Parameters
mailster-mailjet/assets/css/mailster-mailjet-admin.css?ver=1.1.2mailster-mailjet/assets/js/mailster-mailjet-admin.js?ver=1.1.2

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Mailster Mailjet