Multi SMTP Security & Risk Analysis

wordpress.org/plugins/multi-smtp

Use multiple SMTP servers to send WordPress emails (wp_mail())

10 active installs v0.1 PHP + WP 3.0.1+ Updated Dec 9, 2016
multi-smtpmultipleserversmtp
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Multi SMTP Safe to Use in 2026?

Generally Safe

Score 85/100

Multi SMTP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The multi-smtp plugin version 0.1 exhibits a mixed security posture. On the positive side, the static analysis reveals no known CVEs, no dangerous functions, no raw SQL queries, and no file operations, indicating a generally cautious approach to sensitive operations. The absence of a large attack surface with zero AJAX handlers, REST API routes, shortcodes, and cron events is also a strong point.

However, significant concerns arise from the taint analysis, which identified three flows with unsanitized paths. While no critical or high severity issues were found in these flows, the presence of unsanitized paths is a fundamental security risk that could potentially lead to vulnerabilities if input is not properly handled. Furthermore, the output escaping is only 43% proper, meaning a substantial portion of the plugin's output is not being escaped, posing a risk of cross-site scripting (XSS) vulnerabilities. The complete lack of nonce and capability checks, particularly given the potential for unsanitized paths, is another area of concern. The vulnerability history being clean is positive, but it does not negate the risks identified in the static analysis, especially for a plugin at version 0.1 which is likely still under active development.

In conclusion, while multi-smtp v0.1 lacks critical vulnerabilities and a broad attack surface, the identified unsanitized paths and insufficient output escaping represent tangible security weaknesses. The absence of capability and nonce checks further compounds these risks. Developers should prioritize addressing these issues to improve the plugin's overall security.

Key Concerns

  • Unsanitized paths found in taint analysis
  • Low percentage of properly escaped output
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Multi SMTP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Multi SMTP Release Timeline

v0.1Current
Code Analysis
Analyzed Apr 16, 2026

Multi SMTP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
13 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

43% escaped30 total outputs
Data Flows · Security
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
testSettingsPage (multi-smtp.php:264)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Multi SMTP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menumulti-smtp.php:30
actionadmin_initmulti-smtp.php:31
actionphpmailer_initmulti-smtp.php:32
filtersite_transient_update_pluginsmulti-smtp.php:319
Maintenance & Trust

Multi SMTP Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.33
Last updatedDec 9, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Multi SMTP Developer Profile

subins2000

4 plugins · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Multi SMTP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Multi SMTP