Post Comment Notification Security & Risk Analysis

wordpress.org/plugins/post-comment-notification-to-multiple-user

Notify users other than the admin that new comments or new post have been posted or created

80 active installs v1.0 PHP + WP 3.0.0+ Updated Nov 14, 2012
commentsemailmoderationnew-post-moderatenotification
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Comment Notification Safe to Use in 2026?

Generally Safe

Score 85/100

Post Comment Notification has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The post-comment-notification-to-multiple-user plugin v1.0 exhibits significant security concerns despite having no recorded vulnerability history or a large attack surface. The static analysis reveals that 100% of the detected SQL queries are not using prepared statements, which is a critical security flaw. Furthermore, 100% of the output operations are not properly escaped, leaving the plugin vulnerable to cross-site scripting (XSS) attacks. The taint analysis identified two flows with unsanitized paths, indicating potential for data injection or manipulation, though without critical or high severity labels. The absence of any capability checks or nonce checks on any entry points further exacerbates these risks. While the lack of a known vulnerability history is a positive sign, it does not negate the present, demonstrable weaknesses in the code. The plugin's core functionality, which involves handling comments and notifications, suggests that these unescaped outputs and raw SQL queries could have serious implications if exploited.

Key Concerns

  • 100% of SQL queries use prepared statements
  • 100% of outputs are not properly escaped
  • 2 flows with unsanitized paths found
  • 0 Nonce checks present
  • 0 Capability checks present
Vulnerabilities
None known

Post Comment Notification Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post Comment Notification Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries

Output Escaping

0% escaped9 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
cn_show_form (post-comment-notification-to-multiple-user.php:127)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Post Comment Notification Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_menupost-comment-notification-to-multiple-user.php:63
actionadmin_menupost-comment-notification-to-multiple-user.php:87
actionadmin_menupost-comment-notification-to-multiple-user.php:111
actionadmin_menupost-comment-notification-to-multiple-user.php:115
actioncomment_postpost-comment-notification-to-multiple-user.php:275
actionsave_postpost-comment-notification-to-multiple-user.php:318
Maintenance & Trust

Post Comment Notification Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.0
Last updatedNov 14, 2012
PHP min version
Downloads5K

Community Trust

Rating70/100
Number of ratings2
Active installs80
Developer Profile

Post Comment Notification Developer Profile

Rahul Mukherjee

1 plugin · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Comment Notification

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
options
FAQ

Frequently Asked Questions about Post Comment Notification