Re-Welcome Security & Risk Analysis

wordpress.org/plugins/re-welcome

Adds a row action to resend the Welcome email

100 active installs v1.0 PHP + WP 2.8.0+ Updated May 22, 2017
emailresendwelcome
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Re-Welcome Safe to Use in 2026?

Generally Safe

Score 85/100

Re-Welcome has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

Based on the static analysis, the "re-welcome" v1.0 plugin exhibits a strong security posture. The absence of any detected dangerous functions, raw SQL queries, unsanitized output, file operations, or external HTTP requests is highly commendable. The fact that 100% of SQL queries use prepared statements and all outputs are properly escaped demonstrates good development practices. Furthermore, the presence of a nonce check indicates an attempt to mitigate common web vulnerabilities, although the lack of capability checks on any entry points is a notable absence.

The taint analysis reveals no flows with unsanitized paths, suggesting that user-supplied data is not being mishandled within the plugin's current scope. The vulnerability history is also clean, with no recorded CVEs for this plugin, which is a positive indicator. However, the complete lack of entry points (AJAX, REST API, shortcodes, cron events) means the plugin may have minimal functionality or that the analysis scope was limited. If the plugin is intended to have user interaction, the absence of any protected entry points is a concern that warrants further investigation.

In conclusion, the "re-welcome" v1.0 plugin appears to be well-written from a security perspective, adhering to many best practices. The primary weakness identified is the lack of capability checks on any potential entry points, which, combined with the minimal detected attack surface, suggests a need for caution if the plugin's functionality is more extensive than apparent. The absence of any vulnerabilities in its history is a significant strength.

Key Concerns

  • Missing capability checks on entry points
Vulnerabilities
None known

Re-Welcome Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Re-Welcome Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Re-Welcome Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_noticesre-welcome.php:42
actionload-users.phpre-welcome.php:45
filteruser_row_actionsre-welcome.php:55
Maintenance & Trust

Re-Welcome Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedMay 22, 2017
PHP min version
Downloads4K

Community Trust

Rating68/100
Number of ratings5
Active installs100
Developer Profile

Re-Welcome Developer Profile

Andrew Klimek

2 plugins · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Re-Welcome

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
updated
FAQ

Frequently Asked Questions about Re-Welcome