Pixeline's Email Protector Security & Risk Analysis

wordpress.org/plugins/pixelines-email-protector

Write email addresses without worrying about spambots and email harvesters.

900 active installs v1.4.0 PHP + WP 2.7+ Updated Sep 6, 2025
addressemailharvestobfuscatespam
99
A · Safe
CVEs total1
Unpatched0
Last CVESep 9, 2025
Safety Verdict

Is Pixeline's Email Protector Safe to Use in 2026?

Generally Safe

Score 99/100

Pixeline's Email Protector has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Sep 9, 2025Updated 6mo ago
Risk Assessment

The pixelines-email-protector plugin, v1.4.0, exhibits a generally strong security posture based on the static analysis. The complete absence of direct attack surface entry points like AJAX handlers, REST API routes, and shortcodes, combined with the fact that all observed outputs are properly escaped, are significant strengths. The lack of file operations, external HTTP requests, and the absence of critical or high-severity taint flows further contribute to this positive assessment. However, there are notable concerns. The plugin utilizes a single SQL query that does not employ prepared statements, presenting a potential risk for SQL injection if input is not meticulously handled elsewhere. The complete lack of nonce and capability checks across any potential entry points, though currently moot due to the zero attack surface, represents a significant gap in security best practices. Furthermore, the plugin has a history of a medium-severity Cross-Site Scripting (XSS) vulnerability, even though it is currently patched. This indicates a past weakness in input sanitization or output escaping for certain scenarios, and while no current XSS vulnerabilities are flagged, the history warrants vigilance. The plugin's strengths lie in its minimal attack surface and robust output escaping, but the unescaped SQL query and the historical XSS vulnerability are areas that require attention.

Key Concerns

  • SQL queries without prepared statements
  • No nonce checks
  • No capability checks
  • Past medium severity XSS vulnerability
Vulnerabilities
1

Pixeline's Email Protector Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-58982medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Pixeline's Email Protector <= 1.3.8 - Authenticated (Admin+) Stored Cross-Site Scripting

Sep 9, 2025 Patched in 1.4.0 (7d)
Code Analysis
Analyzed Mar 16, 2026

Pixeline's Email Protector Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
0
10 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

100% escaped10 total outputs
Attack Surface

Pixeline's Email Protector Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionplugins_loadedpixeline-email-protector.php:49
actionadmin_menupixeline-email-protector.php:62
actionadmin_initpixeline-email-protector.php:63
filtercomment_textpixeline-email-protector.php:65
filterthe_contentpixeline-email-protector.php:66
filterget_the_contentpixeline-email-protector.php:67
filterthe_excerptpixeline-email-protector.php:68
filterget_the_excerptpixeline-email-protector.php:69
actionwp_enqueue_scriptspixeline-email-protector.php:70
filterthe_titlepixeline-email-protector.php:71
filterget_the_titlepixeline-email-protector.php:72
filterwidget_textpixeline-email-protector.php:73
filterwidget_text_contentpixeline-email-protector.php:74
Maintenance & Trust

Pixeline's Email Protector Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedSep 6, 2025
PHP min version
Downloads21K

Community Trust

Rating86/100
Number of ratings8
Active installs900
Developer Profile

Pixeline's Email Protector Developer Profile

pixeline

3 plugins · 1K total installs

97
trust score
Avg Security Score
95/100
Avg Patch Time
7 days
View full developer profile
Detection Fingerprints

How We Detect Pixeline's Email Protector

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pixelines-email-protector/pixeline-email-protector.js
Script Paths
/wp-content/plugins/pixelines-email-protector/pixeline-email-protector.js
Version Parameters
pixelines-email-protector/pixeline-email-protector.js?ver=

HTML / DOM Fingerprints

CSS Classes
pep-email
Data Attributes
title
FAQ

Frequently Asked Questions about Pixeline's Email Protector