Mailster for WooCommerce Security & Risk Analysis

wordpress.org/plugins/mailster-woocommerce

Add your WooCommerce customers to your Mailster subscriber lists

1K active installs v2.0.2 PHP 7.4+ WP 6.2+ Updated Dec 4, 2024
ecommerceleadsmailsternewsletterwoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mailster for WooCommerce Safe to Use in 2026?

Generally Safe

Score 92/100

Mailster for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "mailster-woocommerce" v2.0.2 plugin exhibits a generally strong security posture based on the provided static analysis. It demonstrates good practices by having no recorded vulnerabilities (CVEs) and by utilizing prepared statements for all SQL queries. The absence of dangerous functions, file operations, and external HTTP requests further contributes to its security. A notable strength is the presence of a nonce check, indicating an awareness of common attack vectors.

However, concerns arise from the output escaping. With 55% of outputs properly escaped, there's a significant portion (45%) that remains unescaped. This could potentially lead to Cross-Site Scripting (XSS) vulnerabilities if user-controlled data is directly outputted without proper sanitization. The lack of capability checks on any entry points (AJAX handlers, REST API routes, shortcodes, cron events) is also a concern, as it suggests that any authenticated user, regardless of their role or permissions, might be able to trigger these functions. The zero taint analysis flows, while appearing positive, might also indicate an insufficient scope of analysis or that the plugin's functionality doesn't inherently lend itself to complex data flow issues, rather than a complete absence of risk.

In conclusion, the plugin is solid in its handling of database interactions and has a clean vulnerability history. The primary areas for improvement and potential risk lie in enhancing output escaping to prevent XSS and implementing capability checks on all entry points to enforce proper authorization. Addressing these aspects would significantly bolster its overall security.

Key Concerns

  • Significant percentage of unescaped output
  • No capability checks on entry points
Vulnerabilities
None known

Mailster for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Mailster for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
19
23 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

55% escaped42 total outputs
Attack Surface

Mailster for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 22
actionmailster_workflow_triggersclasses\automation.class.php:11
actionenqueue_block_editor_assetsclasses\automation.class.php:12
actionwoocommerce_order_status_changedclasses\automation.class.php:13
actionadmin_noticesclasses\woocommerce.class.php:17
actioninitclasses\woocommerce.class.php:20
filtermailster_setting_sectionsclasses\woocommerce.class.php:22
actionmailster_section_tab_woocommerceclasses\woocommerce.class.php:23
filterwoocommerce_settings_tabs_arrayclasses\woocommerce.class.php:25
actionwoocommerce_settings_tabs_mailsterclasses\woocommerce.class.php:26
actionwoocommerce_settings_mailsterclasses\woocommerce.class.php:27
actionadd_meta_boxes_productclasses\woocommerce.class.php:29
actionsave_post_productclasses\woocommerce.class.php:31
actionwoocommerce_checkout_update_order_metaclasses\woocommerce.class.php:36
actionwoocommerce_order_status_completedclasses\woocommerce.class.php:38
actionwoocommerce_thankyouclasses\woocommerce.class.php:39
actionwoocommerce_emailclasses\woocommerce.class.php:41
filterwoocommerce_email_stylesclasses\woocommerce.class.php:43
filtermailster_wp_mail_template_fileclasses\woocommerce.class.php:45
filtermailster_dynamic_post_typesclasses\woocommerce.class.php:47
filtermailster_editor_tagsclasses\woocommerce.class.php:48
actionwoocommerce_blocks_loadedclasses\woocommerce.class.php:50
filtermailster_wp_mail_htmlifyclasses\woocommerce.class.php:377
Maintenance & Trust

Mailster for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedDec 4, 2024
PHP min version7.4
Downloads36K

Community Trust

Rating76/100
Number of ratings8
Active installs1K
Developer Profile

Mailster for WooCommerce Developer Profile

EverPress

28 plugins · 121K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
255 days
View full developer profile
Detection Fingerprints

How We Detect Mailster for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mailster-woocommerce/build/trigger/index.js
Version Parameters
mailster-woocommerce/build/trigger/index.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Mailster for WooCommerce