Post2Mail Security & Risk Analysis

wordpress.org/plugins/post2mail

Post2Mail plugin allows you to automatically e-mail selected people when a post is published on your blog.

10 active installs v1.0.0 PHP + WP 2.7+ Updated Mar 7, 2012
emailmailpostpost2mail
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post2Mail Safe to Use in 2026?

Generally Safe

Score 85/100

Post2Mail has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The static analysis of the 'post2mail' plugin v1.0.0 reveals an exceptionally small attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. The code also demonstrates strong adherence to secure coding practices, showing no dangerous functions, 100% prepared statements for SQL queries, and 100% properly escaped output. Furthermore, there are no file operations, external HTTP requests, or indications of insecure handling of nonces or capabilities.

However, the absence of any identified entry points in the static analysis, while seemingly positive, also means there are no mechanisms for the plugin to perform its intended function (if it has one, e.g., sending posts via email). This could suggest that either the plugin is non-functional or its functionality is entirely contained within its initial setup without user-facing or background processes that would typically create an attack surface. The lack of any vulnerability history is also noteworthy, indicating a clean past. Despite the apparent security strengths in the analyzed code, the lack of any discernible attack surface raises questions about the plugin's purpose and completeness of analysis. It's strong in code hygiene but potentially weak in functionality due to its zero-entry-point profile.

Key Concerns

  • Zero entry points and unprotected entry points
  • No nonce checks detected
  • No capability checks detected
Vulnerabilities
None known

Post2Mail Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Post2Mail Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Post2Mail Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionpublish_postpost2mail.php:53
Maintenance & Trust

Post2Mail Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedMar 7, 2012
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Post2Mail Developer Profile

williamlong

4 plugins · 90 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post2Mail

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Post2Mail