Outgoing Mail Identity Editor Security & Risk Analysis

wordpress.org/plugins/outgoing-mail-identity-editor

Change the default name and email address on outgoing WordPress emails (e.g. Password Reset).

100 active installs v1.0 PHP + WP 3.0.1+ Updated Nov 28, 2019
change-from-mailemailmailmail-sender-addressmail-sender-name
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Outgoing Mail Identity Editor Safe to Use in 2026?

Generally Safe

Score 85/100

Outgoing Mail Identity Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The 'outgoing-mail-identity-editor' plugin v1.0 exhibits a strong security posture based on the provided static analysis. There are no identified entry points like AJAX handlers, REST API routes, or shortcodes, and no direct file operations or external HTTP requests. The code also adheres to good practices by using prepared statements for all SQL queries. The absence of critical or high-severity taint flows further reinforces this positive assessment.

However, a notable concern is the low percentage of properly escaped output (33%). This indicates that some data displayed to users or processed internally might not be adequately sanitized, potentially leading to cross-site scripting (XSS) vulnerabilities if user-supplied input is involved in these unescaped outputs. Furthermore, the complete lack of nonce and capability checks across all code signals a significant gap in securing its (currently minimal) entry points. While there are no entry points reported, if any were to be introduced in future versions or through unforeseen interactions, the absence of these fundamental security measures would make them highly vulnerable.

The plugin has no recorded vulnerability history, which is a positive indicator of past secure development. Coupled with the current static analysis, this suggests the developers are either very cautious or the plugin's functionality is extremely limited, thus presenting a small attack surface. The strengths lie in the absence of common vulnerability vectors like direct SQL injection and external requests. The primary weakness lies in the unescaped output and the lack of authentication/authorization checks, which could become critical if the plugin's scope expands or if hidden functionalities are discovered.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Outgoing Mail Identity Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Outgoing Mail Identity Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped3 total outputs
Attack Surface

Outgoing Mail Identity Editor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuoutgoing-mail-identity-editor.php:27
actionadmin_initoutgoing-mail-identity-editor.php:64
filterwp_mail_fromoutgoing-mail-identity-editor.php:120
filterwp_mail_from_nameoutgoing-mail-identity-editor.php:121
Maintenance & Trust

Outgoing Mail Identity Editor Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedNov 28, 2019
PHP min version
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Outgoing Mail Identity Editor Developer Profile

adambradford

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Outgoing Mail Identity Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
regular-text
FAQ

Frequently Asked Questions about Outgoing Mail Identity Editor