Mailster WPML Security & Risk Analysis

wordpress.org/plugins/mailster-wpml

This add on helps to integrate the Mailster Newsletter Plugin for WordPress with WPML. Requires at least version 2.3 of the Mailster Plugin.

200 active installs v0.4.0 PHP + WP 3.8+ Updated May 27, 2024
mailer
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mailster WPML Safe to Use in 2026?

Generally Safe

Score 92/100

Mailster WPML has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "mailster-wpml" v0.4.0 plugin exhibits a surprisingly robust security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the complete reliance on prepared statements for SQL queries and the absence of dangerous functions, file operations, and external HTTP requests are strong indicators of good security practices. This clean codebase, combined with zero known vulnerabilities, suggests a well-maintained and secure plugin.

However, a critical concern arises from the complete lack of output escaping. With 7 total outputs and 0% properly escaped, this presents a significant risk for Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data displayed by the plugin that is not meticulously sanitized before output can be exploited by attackers to inject malicious scripts. Additionally, the absence of any nonce checks or capability checks, while not directly a risk given the limited entry points, does mean that if any new entry points are introduced in the future without proper security measures, they could be exploited without authentication or authorization.

The vulnerability history being completely clear is a positive sign, indicating a proactive approach to security or a lack of past exploitable issues. The strengths of this plugin lie in its minimal attack surface and secure data handling for database operations. The primary weakness is the blatant disregard for output escaping, which creates a high risk for XSS attacks. While the current lack of entry points mitigates immediate exploitation, the unescaped output is a ticking time bomb if the plugin evolves without addressing this deficiency.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Mailster WPML Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Mailster WPML Release Timeline

v0.4
v0.4.0Current
v0.3
v0.2
v0.1
Code Analysis
Analyzed Mar 16, 2026

Mailster WPML Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Attack Surface

Mailster WPML Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
actioninitclasses\wpml.class.php:19
filtermailster_redirect_toclasses\wpml.class.php:74
filteris_mailster_newsletter_homepageclasses\wpml.class.php:75
filtermailster_rewrite_rulesclasses\wpml.class.php:76
filteradmin_enqueue_scriptsclasses\wpml.class.php:77
filtermailster_section_tab_textsclasses\wpml.class.php:78
actionmailster_textclasses\wpml.class.php:79
filtermailster_setting_sectionsclasses\wpml.class.php:81
actionmailster_section_tab_wpml_textsclasses\wpml.class.php:82
actionadmin_enqueue_scriptsclasses\wpml.class.php:83
actionmailster_verify_subscriberclasses\wpml.class.php:84
filtermailster_placeholder_customclasses\wpml.class.php:86
actionmailster_frontpageclasses\wpml.class.php:88
actionmailster_subscriber_after_metaclasses\wpml.class.php:89
action_mailster_get_last_post_argsclasses\wpml.class.php:90
actionmailster_textclasses\wpml.class.php:249
Maintenance & Trust

Mailster WPML Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 27, 2024
PHP min version
Downloads6K

Community Trust

Rating90/100
Number of ratings2
Active installs200
Developer Profile

Mailster WPML Developer Profile

EverPress

28 plugins · 120K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
255 days
View full developer profile
Detection Fingerprints

How We Detect Mailster WPML

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mailster-wpml/assets/css/newsletter-style.css/wp-content/plugins/mailster-wpml/assets/js/newsletter-script.js/wp-content/plugins/mailster-wpml/assets/js/settings-script.js
Script Paths
/wp-content/plugins/mailster-wpml/assets/js/newsletter-script.js/wp-content/plugins/mailster-wpml/assets/js/settings-script.js
Version Parameters
mailster-wpml/assets/css/newsletter-style.css?ver=mailster-wpml/assets/js/newsletter-script.js?ver=mailster-wpml/assets/js/settings-script.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpml-text-tab
Data Attributes
id="mailster_lang"
FAQ

Frequently Asked Questions about Mailster WPML