Post Notify Users Security & Risk Analysis

wordpress.org/plugins/post-notify-users

Notified by e-mail to the user with the roles set at the time of new posting.

100 active installs v1.07 PHP 8.0+ WP 4.7+ Updated Mar 29, 2026
mailnotifypostsrolesusers
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Notify Users Safe to Use in 2026?

Generally Safe

Score 100/100

Post Notify Users has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "post-notify-users" plugin version 1.07 presents a generally positive security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, all identified SQL queries are unescaped, which is a significant concern. The analysis also indicates that output escaping is fully implemented, and there are no recorded vulnerabilities (CVEs) for this plugin. This lack of historical vulnerabilities, coupled with the limited attack surface, suggests a relatively secure plugin. However, the use of raw SQL queries without prepared statements represents a direct and exploitable risk, as it can lead to SQL injection vulnerabilities if user-supplied data is incorporated into these queries without proper sanitization, which is not evident from the provided data.

While the plugin demonstrates good practices in output escaping and avoids common entry points that often harbor vulnerabilities, the unescaped SQL queries are a notable weakness. The absence of any identified taint flows or critical/high-severity issues is reassuring, but it's crucial to remember that static analysis might not catch all dynamic or complex vulnerabilities. The vulnerability history showing zero CVEs is a strong indicator of historical security, but it does not guarantee future safety, especially in light of the identified SQL query issue.

Key Concerns

  • Raw SQL queries without prepared statements
Vulnerabilities
None known

Post Notify Users Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Post Notify Users Release Timeline

v1.07Current
v1.06
v1.05
v1.04
v1.03
v1.02
v1.01
v1.00
Code Analysis
Analyzed Mar 16, 2026

Post Notify Users Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries
Attack Surface

Post Notify Users Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Post Notify Users Maintenance & Trust

Maintenance Signals

WordPress version tested7.0
Last updatedMar 29, 2026
PHP min version8.0
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Post Notify Users Developer Profile

Katsushi Kawamori

54 plugins · 56K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
178 days
View full developer profile
Detection Fingerprints

How We Detect Post Notify Users

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-notify-users/css/admin.css/wp-content/plugins/post-notify-users/js/admin.js/wp-content/plugins/post-notify-users/js/front.js
Script Paths
/wp-content/plugins/post-notify-users/js/admin.js/wp-content/plugins/post-notify-users/js/front.js
Version Parameters
post-notify-users/css/admin.css?ver=post-notify-users/js/admin.js?ver=post-notify-users/js/front.js?ver=

HTML / DOM Fingerprints

CSS Classes
post_notify_users_settings
FAQ

Frequently Asked Questions about Post Notify Users