PressMailer Security & Risk Analysis

wordpress.org/plugins/pressmailer

PressMailer enables you to change the texts of default notifications in WordPress and makes the notifications a bit nicer with HTML mails.

0 active installs v1.0.5 PHP + WP 5.5+ Updated Unknown
adminemailemail-designemail-templatehtml-mail
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PressMailer Safe to Use in 2026?

Generally Safe

Score 100/100

PressMailer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The Pressformer plugin v1.0.5 exhibits a generally good security posture with no recorded vulnerabilities and a strong emphasis on secure coding practices like prepared statements for all SQL queries and the presence of nonce and capability checks. The lack of external HTTP requests and a small number of entry points further contribute to a reduced attack surface. However, the static analysis reveals potential weaknesses, primarily in output escaping, with only 40% of 55 outputs being properly escaped. This leaves room for cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled correctly before being displayed. Additionally, the taint analysis identified two flows with unsanitized paths, indicating potential issues with how data is processed, even though these did not reach critical or high severity levels in this analysis. The file operation also warrants attention. While the plugin's history is clean, the identified code signals suggest that ongoing vigilance and code review are necessary, particularly concerning output sanitation and data handling to prevent future security flaws.

Key Concerns

  • Insufficient output escaping
  • Taint flows with unsanitized paths
  • Presence of file operations
  • Bundled outdated library (Select2 v3.0.3)
Vulnerabilities
None known

PressMailer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

PressMailer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
33
22 escaped
Nonce Checks
3
Capability Checks
3
File Operations
1
External Requests
0
Bundled Libraries
1

Bundled Libraries

Select23.0.3

Output Escaping

40% escaped55 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
loadPostNew (src\Admin\Controllers\CreateEmailController.php:45)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

PressMailer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initpressmailer.php:67
actionadmin_noticespressmailer.php:68
actionwp_loadedsrc\Admin\Ajax\AbstractAjaxHandler.php:29
actionadd_meta_boxessrc\PostType\MetaBoxes\AbstractMetaBox.php:13
actionsave_postsrc\PostType\MetaBoxes\AbstractMetaBox.php:14
Maintenance & Trust

PressMailer Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedUnknown
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

PressMailer Developer Profile

roelv

4 plugins · 10 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PressMailer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pressmailer/dist/admin.css/wp-content/plugins/pressmailer/dist/admin.js/wp-content/plugins/pressmailer/dist/emaileditor.js
Version Parameters
pressmailer/dist/admin.css?ver=pressmailer/dist/admin.js?ver=pressmailer/dist/emaileditor.js?ver=

HTML / DOM Fingerprints

CSS Classes
prema_email_editor
Data Attributes
data-prema-editor
JS Globals
prema_email_editor_data
FAQ

Frequently Asked Questions about PressMailer