Mass Email To users Security & Risk Analysis

wordpress.org/plugins/mass-email-to-users

Mass Email To Users is the plugin for sending a mass email to WordPress users. Admin can send an email to WordPress users together.

900 active installs v1.1.5 PHP + WP 3.0+ Updated Dec 4, 2025
mass-emailsend-email-to-userswordpress-email-marketingwordpress-mailerwordpress-mass-email
100
A · Safe
CVEs total1
Unpatched0
Last CVEApr 28, 2023
Safety Verdict

Is Mass Email To users Safe to Use in 2026?

Generally Safe

Score 100/100

Mass Email To users has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Apr 28, 2023Updated 5mo ago
Risk Assessment

The 'mass-email-to-users' plugin, version 1.1.5, exhibits a generally strong security posture with no identified critical or high-severity vulnerabilities in static analysis or taint flows. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, all SQL queries utilize prepared statements, which is a best practice for preventing SQL injection vulnerabilities. The presence of nonce checks on some operations is also a positive sign.

However, there are areas for improvement. The output escaping is only properly implemented in 37% of cases, indicating a potential risk of Cross-Site Scripting (XSS) vulnerabilities. This is further supported by the plugin's vulnerability history, which includes a medium-severity XSS vulnerability reported in April 2023. While this vulnerability is currently unpatched, the fact that there are no *currently* unpatched CVEs suggests that past vulnerabilities may have been addressed, but the underlying coding practices regarding output sanitization need attention.

In conclusion, the plugin has a low immediate risk due to its limited attack surface and secure database practices. The primary concern lies with the inconsistent output escaping, which, coupled with past XSS issues, warrants careful monitoring and remediation. While the plugin demonstrates good practices in several areas, the prevalence of unescaped output suggests a potential weakness that could be exploited, particularly if new entry points or vulnerabilities are introduced in future versions.

Key Concerns

  • Insufficient output escaping
  • Past medium severity XSS vulnerability
Vulnerabilities
1 published

Mass Email To users Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2022-47600medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Mass Email To users <= 1.1.4 - Unauthenticated Reflected Cross-Site Scripting via 'entrant'

Apr 28, 2023 Patched in 1.1.5 (270d)
Version History

Mass Email To users Release Timeline

v1.1.5Current
v1.1.41 CVE
v1.1.31 CVE
v1.1.21 CVE
v1.1.11 CVE
v1.11 CVE
Code Analysis
Analyzed Mar 16, 2026

Mass Email To users Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
3 prepared
Unescaped Output
45
26 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared3 total queries

Output Escaping

37% escaped71 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
massEmail_func (wordpressmassemail.php:154)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Mass Email To users Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuwordpressmassemail.php:15
actionplugins_loadedwordpressmassemail.php:16
filteruser_has_capwordpressmassemail.php:19
filtermap_meta_capwordpressmassemail.php:30
Maintenance & Trust

Mass Email To users Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 4, 2025
PHP min version
Downloads41K

Community Trust

Rating62/100
Number of ratings8
Active installs900
Alternatives

Mass Email To users Alternatives

No alternatives data available yet.

Developer Profile

Mass Email To users Developer Profile

Nks

19 plugins · 23K total installs

77
trust score
Avg Security Score
97/100
Avg Patch Time
350 days
View full developer profile
Detection Fingerprints

How We Detect Mass Email To users

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mass-email-to-users/js/jqueryValidate.js/wp-content/plugins/mass-email-to-users/css/styles.css/wp-content/plugins/mass-email-to-users/images/paypaldonate.jpg
Script Paths
/wp-content/plugins/mass-email-to-users/js/jqueryValidate.js
Version Parameters
mass-email-to-users/css/styles.css?ver=mass-email-to-users/js/jqueryValidate.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-hrefdata-layoutdata-actiondata-sizedata-show-facesdata-share+1 more
JS Globals
facebook-jssdk
FAQ

Frequently Asked Questions about Mass Email To users