Multiple Admin Emails Security & Risk Analysis

wordpress.org/plugins/multi-admin-emails

Add multiple admin emails for notification such as new user registration.

10 active installs v1.0.1 PHP + WP 3.0.1+ Updated Unknown
admin-notificationmultiple-emails
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Multiple Admin Emails Safe to Use in 2026?

Generally Safe

Score 100/100

Multiple Admin Emails has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "multi-admin-emails" plugin v1.0.1 exhibits a very limited attack surface with no apparent entry points identified in the static analysis. This is a strong indicator of good initial security design. Furthermore, the absence of dangerous functions, file operations, external HTTP requests, and the use of prepared statements for all SQL queries are all positive security practices. The plugin's vulnerability history is also clean, with no known CVEs, suggesting a track record of security consciousness.

However, the static analysis reveals a critical concern: 100% of the identified output operations are not properly escaped. This lack of output sanitization is a significant security weakness that could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is ever outputted without proper encoding. While the taint analysis found no specific unsanitized flows, this is likely due to the limited flows analyzed and does not negate the risk of unescaped output. The absence of nonce and capability checks on any potential, albeit currently unidentified, entry points is also a concern, as it leaves them unprotected against common WordPress attack vectors.

In conclusion, while the "multi-admin-emails" plugin has a clean vulnerability history and good practices regarding SQL and overall entry point reduction, the unescaped output is a serious flaw that needs immediate attention. The lack of specific security checks on potential future entry points also warrants consideration for a more robust security posture.

Key Concerns

  • 100% of outputs not properly escaped
  • No nonce checks identified
  • No capability checks identified
Vulnerabilities
None known

Multiple Admin Emails Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Multiple Admin Emails Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Multiple Admin Emails Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menumulti-admin-emails.php:10
actionadmin_initmulti-admin-emails.php:11
Maintenance & Trust

Multiple Admin Emails Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating40/100
Number of ratings1
Active installs10
Developer Profile

Multiple Admin Emails Developer Profile

ferozjaf

2 plugins · 60 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Multiple Admin Emails

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/multi-admin-emails/email-form.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Multiple Admin Emails