replyMail Security & Risk Analysis

wordpress.org/plugins/replymail

Enhance the threaded comments system of WordPress 2.7. When someone reply to your comment, send a email to you.

50 active installs v1.2.0 PHP + WP 2.7+ Updated May 10, 2010
commentsemailmailreplythreaded-comments
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEOct 14, 2025
Safety Verdict

Is replyMail Safe to Use in 2026?

Use With Caution

Score 63/100

replyMail has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Oct 14, 2025Updated 15yr ago
Risk Assessment

The "replymail" plugin v1.2.0 presents a mixed security picture. On the positive side, it demonstrates good practices by having no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface. Furthermore, all identified SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are excellent security measures. The plugin also includes one capability check, indicating some level of access control.

However, significant concerns arise from the static analysis. The most alarming finding is that 100% of the 18 identified output operations are not properly escaped. This leaves the plugin highly vulnerable to Cross-Site Scripting (XSS) attacks, where malicious scripts could be injected and executed in users' browsers.

The vulnerability history also reveals a critical weakness: one unpatched medium severity CVE. The recurrence of Cross-Site Request Forgery (CSRF) as a common vulnerability type, coupled with the lack of nonce checks reported in the code signals, suggests a pattern of inadequate protection against unauthorized actions. The unpatched CVE, specifically a medium severity one, indicates a persistent security flaw that requires immediate attention. While the plugin has strengths in minimizing its attack surface and handling SQL securely, the unescaped output and the unpatched CVE create substantial risks.

Key Concerns

  • Unpatched medium severity CVE
  • 0% output escaping
  • 0 nonce checks
Vulnerabilities
1

replyMail Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-31029medium · 4.3Cross-Site Request Forgery (CSRF)

replyMail <= 1.2.0 - Cross-Site Request Forgery

Oct 14, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

replyMail Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
18
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped18 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
rmSettingPage (settingPanel.php:167)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

replyMail Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_noticesreplyMail.php:26
actioncomment_postreplyMail.php:56
actionadmin_menureplyMail.php:64
actionadmin_headreplyMail.php:66
Maintenance & Trust

replyMail Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedMay 10, 2010
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs50
Developer Profile

replyMail Developer Profile

bingu

2 plugins · 150 total installs

76
trust score
Avg Security Score
74/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect replyMail

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/replymail/replymail.js/wp-content/plugins/replymail/replymail.css
Script Paths
/wp-content/plugins/replymail/replymail.js
Version Parameters
replymail/replymail.css?ver=replymail/replymail.js?ver=

HTML / DOM Fingerprints

CSS Classes
replymail-setting-panel
HTML Comments
<!-- EOF replyMail.php --><!-- ./wp-content/plugins/replymail/replyMail.php -->
JS Globals
replymailreplymail_vars
FAQ

Frequently Asked Questions about replyMail