Rumailer Security & Risk Analysis

wordpress.org/plugins/rumailer

wp free subscriber plugin, wp simple subscriber plugin, wp subscriber, wp subscriber plugin, рассылки, email рассылка, рассылка email, сервис рассылок …

10 active installs v0.0.3 PHP + WP + Updated Sep 27, 2016
deliveryemailmailingregistrationsubscribers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Rumailer Safe to Use in 2026?

Generally Safe

Score 85/100

Rumailer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The rumailer v0.0.3 plugin exhibits a strong security posture from an attack surface perspective, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code analysis reveals no dangerous functions, file operations, or external HTTP requests. The use of prepared statements for all SQL queries is a significant strength, mitigating common SQL injection risks. However, a critical weakness lies in the complete lack of output escaping for all identified output points. This leaves the plugin highly vulnerable to Cross-Site Scripting (XSS) attacks, as any data rendered to the user interface is not sanitized. The absence of nonce checks and capability checks further exacerbates this, meaning even if an attacker cannot directly reach these output points, they might be able to trigger them through other means without proper authorization checks. The plugin also has no recorded vulnerability history, which is positive, but this is in conjunction with the early version number and a very limited analysis scope (0 taint flows). Overall, while the plugin avoids many common pitfalls like vulnerable SQL queries and exposed entry points, the pervasive lack of output escaping presents a severe risk that needs immediate attention.

Key Concerns

  • Outputs not properly escaped
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Rumailer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Rumailer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped17 total outputs
Attack Surface

Rumailer Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Rumailer Maintenance & Trust

Maintenance Signals

WordPress version tested0.0.1
Last updatedSep 27, 2016
PHP min version
Downloads1K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Rumailer Developer Profile

DeathError

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Rumailer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Rumailer