Network Mass Email Security & Risk Analysis

wordpress.org/plugins/network-mass-email

Allows network admins to send a manually created notification email to all registered users based on user role.

10 active installs v1.5 PHP + WP 3.3+ Updated Jan 23, 2013
emailmultisitenetwork
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Network Mass Email Safe to Use in 2026?

Generally Safe

Score 85/100

Network Mass Email has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The plugin 'network-mass-email' v1.5 presents a concerning security posture despite having no recorded vulnerabilities in its history. The static analysis reveals a significant weakness in output escaping, with 0% of the 26 identified outputs being properly escaped. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the user interface via the plugin's outputs. Furthermore, the taint analysis identified 5 high-severity flows with unsanitized paths, suggesting potential for data manipulation or unauthorized access if these paths are triggered through user input. While the plugin has no known CVEs and a relatively low number of SQL queries, the complete absence of nonce checks and capability checks, combined with the output escaping issues and taint analysis findings, creates a substantial attack surface that could be exploited. The lack of these fundamental security checks on entry points (though stated as 0, this might be an artifact of analysis or very limited functionality) is a critical oversight. In conclusion, while the plugin boasts a clean vulnerability history, the static analysis points to critical underlying security flaws that require immediate attention to mitigate XSS and other potential data-related vulnerabilities.

Key Concerns

  • High severity taint flows with unsanitized paths
  • 0% properly escaped output
  • Missing nonce checks
  • Missing capability checks
  • Raw SQL queries (29% prepared)
Vulnerabilities
None known

Network Mass Email Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Network Mass Email Code Analysis

Dangerous Functions
0
Raw SQL Queries
12
5 prepared
Unescaped Output
26
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

29% prepared17 total queries

Output Escaping

0% escaped26 total outputs
Data Flows
8 unsanitized

Data Flow Analysis

8 flows8 with unsanitized paths
nme_menu_page (network-mass-email.php:147)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Network Mass Email Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionnetwork_admin_menunetwork-mass-email.php:129
actionnetwork_admin_menutemplates.php:127
Maintenance & Trust

Network Mass Email Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedJan 23, 2013
PHP min version
Downloads5K

Community Trust

Rating86/100
Number of ratings4
Active installs10
Developer Profile

Network Mass Email Developer Profile

Kenny Zaron

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Network Mass Email

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/network-mass-email/icon.png

HTML / DOM Fingerprints

CSS Classes
nmeerror
HTML Comments
Copyright 2012 Kenny Zaron (email: kzaron@gmail.com)Mail Icon(s) courtesy of: http://www.iconhot.com/icon/android-style-icons-r1/mail-64.html
Data Attributes
name="massemailform"id="nmeerror"name="emailssent"id="emailssent"name="allincsubs"id="allincsubs"+1 more
FAQ

Frequently Asked Questions about Network Mass Email