MultiMailer Security & Risk Analysis

wordpress.org/plugins/scand-multi-mailer

Send data from one contact form to multiple email addresses or save data into log file.

20 active installs v1.0.3 PHP + WP 5.5.0+ Updated Oct 18, 2024
contact-formemail-logphp-mailerscandltdsmtp
49
D · High Risk
CVEs total2
Unpatched2
Last CVEApr 9, 2025
Safety Verdict

Is MultiMailer Safe to Use in 2026?

High Risk

Score 49/100

MultiMailer carries significant security risk with 2 known CVEs, 2 still unpatched. Consider switching to a maintained alternative.

2 known CVEs 2 unpatched Last CVE: Apr 9, 2025Updated 1yr ago
Risk Assessment

The scand-multi-mailer plugin v1.0.3 exhibits a mixed security posture. On one hand, it demonstrates good practices by utilizing prepared statements for all SQL queries and by escaping a significant portion of its output. The attack surface appears to be minimal, with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are directly exposed without authentication. However, significant concerns arise from the presence of the `unserialize` function, which is notoriously dangerous when handling user-supplied input and can lead to deserialization vulnerabilities. Despite the taint analysis not flagging any critical or high severity flows, the existence of three flows with unsanitized paths is a red flag. The vulnerability history is particularly alarming, with two known medium severity CVEs, both of which are currently unpatched. The recurring types of vulnerabilities, Cross-Site Scripting and Cross-Site Request Forgery, suggest potential weaknesses in input validation and state-changing operation protection. The last reported vulnerability being very recent further underscores the need for immediate attention.

Key Concerns

  • Unpatched medium severity CVEs
  • Use of dangerous unserialize function
  • Flows with unsanitized paths detected
  • Missing nonce checks
  • Capability checks missing
  • Vulnerabilities include XSS and CSRF
  • Output escaping is not fully implemented
  • Bundled outdated library (PHPMailer implied)
Vulnerabilities
2

MultiMailer Security Vulnerabilities

CVEs by Year

2 CVEs in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-32517medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

MultiMailer <= 1.0.3 - Reflected Cross-Site Scripting

Apr 9, 2025Unpatched
CVE-2025-32505medium · 6.1Cross-Site Request Forgery (CSRF)

MultiMailer <= 1.0.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting

Apr 9, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

MultiMailer Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
3 prepared
Unescaped Output
20
29 escaped
Nonce Checks
0
Capability Checks
0
File Operations
8
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

unserialize$data = unserialize( $row->data );providers\class-provider-repository.php:106
unserialize$data = unserialize( $row->data );providers\class-provider-repository.php:137

Bundled Libraries

PHPMailer

SQL Query Safety

100% prepared3 total queries

Output Escaping

59% escaped49 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

4 flows3 with unsanitized paths
show_form (providers\class-multi-mailer.php:166)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

MultiMailer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_initproviders\class-multi-mailer.php:26
actionadmin_enqueue_scriptsproviders\class-multi-mailer.php:27
actionadmin_menuproviders\class-multi-mailer.php:28
filterwp_mailproviders\class-multi-mailer.php:50
actioninitscand-multi-mailer.php:46
actioninitscand-multi-mailer.php:48
Maintenance & Trust

MultiMailer Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedOct 18, 2024
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

MultiMailer Developer Profile

SCAND

3 plugins · 330 total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MultiMailer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/scand-multi-mailer/css/scand-multi-mailer-admin.css
Script Paths
/wp-content/plugins/scand-multi-mailer/js/scand-multi-mailer-admin.js
Version Parameters
scand-multi-mailer/js/scand-multi-mailer-admin.js?ver=scand-multi-mailer/css/scand-multi-mailer-admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
plugin-titlepage-title-action
Data Attributes
data-form-iddata-idname_provider
FAQ

Frequently Asked Questions about MultiMailer