Psmailer Security & Risk Analysis

wordpress.org/plugins/psmailer

Ya puedes colocar de forma fácil un formulario para que tus visitantes se suscriban al newsletter.

10 active installs v3.4 PHP + WP 3.7+ Updated Apr 27, 2016
emailformsignupsubscribesubscription
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Psmailer Safe to Use in 2026?

Generally Safe

Score 85/100

Psmailer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "psmailer" plugin v3.4 exhibits a generally positive security posture with some areas for improvement. The absence of known vulnerabilities and CVEs, coupled with the lack of dangerous functions and a reliance on prepared statements for SQL queries, are strong indicators of good development practices. The static analysis reveals a limited attack surface, with no unprotected AJAX handlers or REST API routes identified. However, the plugin does present some potential weaknesses. A significant portion of its output (40%) is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is directly rendered. Furthermore, the complete absence of nonce checks and capability checks, especially given that the plugin has an external HTTP request, raises concerns about potential CSRF or unauthorized actions. While no taint flows were identified in this analysis, the combination of unescaped output and lack of authorization checks on entry points warrants caution. Overall, "psmailer" v3.4 is relatively secure due to its clean vulnerability history and absence of critical code signals, but the identified output escaping and authorization weaknesses represent the primary risks.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Psmailer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Psmailer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
25 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

60% escaped42 total outputs
Attack Surface

Psmailer Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[signup] psmailer_main.php:145
WordPress Hooks 3
actionplugins_loadedpsmailer_settings.php:22
actionwp_enqueue_scriptspsmailer_settings.php:31
actionwidgets_initpsmailer_settings.php:38
Maintenance & Trust

Psmailer Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedApr 27, 2016
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Psmailer Developer Profile

rjjuser

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Psmailer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/psmailer/css/psmailer_style.css

HTML / DOM Fingerprints

CSS Classes
psmailerpsmailer_infopsmailer_senderrorhide
Data Attributes
id="psmailer"id="psmailer_name"id="psmailer_email"id="psmailer_firstname"id="psmailer_lastname"id="psmailer_send"
JS Globals
window.psmailer-rand
Shortcode Output
<form class="psmailer" id="psmailer" method="post" action="">
FAQ

Frequently Asked Questions about Psmailer