MC4WP: WPML Integration Security & Risk Analysis

wordpress.org/plugins/mc4wp-wpml

WPML integration for the Mailchimp for WordPress plugin.

2K active installs v1.0.5 PHP 5.3+ WP 3.7+ Updated Aug 18, 2025
mailchimpmc4wpwpml
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is MC4WP: WPML Integration Safe to Use in 2026?

Generally Safe

Score 100/100

MC4WP: WPML Integration has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9mo ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "mc4wp-wpml" v1.0.5 plugin exhibits a strong security posture. The static analysis reveals a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that could serve as entry points for malicious activity. Crucially, there are no unprotected entry points. The code analysis further strengthens this positive assessment, showing no dangerous functions, all SQL queries using prepared statements, and all output being properly escaped. The absence of file operations and external HTTP requests also reduces potential attack vectors.

The vulnerability history is equally reassuring, with zero known CVEs, unpatched vulnerabilities, or recorded common vulnerability types. This lack of historical security issues suggests a well-maintained and secure plugin. The plugin demonstrates good security practices by minimizing its attack surface, utilizing secure coding techniques like prepared statements and output escaping, and having a clean vulnerability record. Therefore, the overall security risk for this plugin version is very low. The most significant weakness, albeit a minor one given the overall context, is the complete absence of nonce and capability checks, which could be a consideration for future hardening, though with the current minimal attack surface and lack of identified vulnerabilities, it doesn't represent an immediate high risk.

Key Concerns

  • No nonce checks
  • No capability checks
Vulnerabilities
None known

MC4WP: WPML Integration Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

MC4WP: WPML Integration Release Timeline

v1.0.5Current
v1.0.4
v1.0.3
v1.0.2
v1.0.1
v1.0
Code Analysis
Analyzed Mar 16, 2026

MC4WP: WPML Integration Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped8 total outputs
Attack Surface

MC4WP: WPML Integration Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filtermc4wp_admin_menu_itemsincludes\admin-hooks.php:3
actionadmin_initincludes\admin-hooks.php:13
filtermc4wp_listsincludes\hooks.php:3
filtermc4wp_subscriber_dataincludes\hooks.php:16
actionplugins_loadedmc4wp-wpml.php:30
Maintenance & Trust

MC4WP: WPML Integration Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedAug 18, 2025
PHP min version5.3
Downloads24K

Community Trust

Rating60/100
Number of ratings1
Active installs2K
Developer Profile

MC4WP: WPML Integration Developer Profile

Danny van Kooten

9 plugins · 1.1M total installs

77
trust score
Avg Security Score
97/100
Avg Patch Time
708 days
View full developer profile
Detection Fingerprints

How We Detect MC4WP: WPML Integration

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about MC4WP: WPML Integration