Send From Security & Risk Analysis

wordpress.org/plugins/send-from

Plugin for modifying the from line on all emails coming from WordPress.

600 active installs v2.5 PHP + WP 5.9+ Updated Oct 10, 2025
emailmail-fromphpmailersendersmtp
99
A · Safe
CVEs total1
Unpatched0
Last CVEApr 24, 2025
Safety Verdict

Is Send From Safe to Use in 2026?

Generally Safe

Score 99/100

Send From has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Apr 24, 2025Updated 5mo ago
Risk Assessment

The 'send-from' v2.5 plugin demonstrates a generally good security posture with several positive indicators. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points is a significant strength, suggesting a limited attack surface. The code also shows a strong commitment to secure database interactions, with 100% of SQL queries using prepared statements. Furthermore, the presence of nonce and capability checks indicates an awareness of WordPress security best practices for authentication and authorization. However, the static analysis reveals a concerning area: 50% of output is not properly escaped. This, combined with taint analysis showing two flows with unsanitized paths, presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities, even if no critical or high severity taint flows were identified in this specific scan.

The plugin's vulnerability history, while showing no currently unpatched CVEs, includes one past vulnerability related to Cross-Site Scripting. The fact that the last vulnerability was recent (April 2025) and was an XSS issue, aligns with the concerns raised by the static analysis regarding unescaped output. This pattern suggests a recurring weakness in handling user-supplied data that could be rendered in the frontend.

In conclusion, 'send-from' v2.5 has a strong foundation in terms of attack surface management and secure database operations. The primary weakness lies in the incomplete output escaping, which, despite the absence of critical taint flows in this analysis, remains a notable risk due to the historical XSS vulnerability and the current static analysis findings. Addressing the unescaped outputs is crucial to mitigating potential XSS attacks.

Key Concerns

  • Unescaped output found
  • Unsanitized paths in taint flows
  • Past XSS vulnerability
Vulnerabilities
1

Send From Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-46469medium · 5.5Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Send From <= 2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting

Apr 24, 2025 Patched in 2.3 (174d)
Code Analysis
Analyzed Mar 16, 2026

Send From Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
15 escaped
Nonce Checks
3
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped30 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
render_site_settings_screen (send-from.php:538)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Send From Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_noticessend-from.php:261
actionnetwork_admin_noticessend-from.php:263
actionnetwork_admin_menusend-from.php:267
actionadmin_initsend-from.php:271
actionadmin_menusend-from.php:272
actioninitsend-from.php:275
filterwp_mail_fromsend-from.php:282
filterwp_mail_from_namesend-from.php:283
Maintenance & Trust

Send From Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedOct 10, 2025
PHP min version
Downloads14K

Community Trust

Rating100/100
Number of ratings8
Active installs600
Developer Profile

Send From Developer Profile

Benjamin Buddle

1 plugin · 600 total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
174 days
View full developer profile
Detection Fingerprints

How We Detect Send From

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/send-from/css/send-from-admin.css/wp-content/plugins/send-from/js/send-from-admin.js
Script Paths
/wp-content/plugins/send-from/js/send-from-admin.js
Version Parameters
send-from/css/send-from-admin.css?ver=send-from/js/send-from-admin.js?ver=

HTML / DOM Fingerprints

JS Globals
send_from_admin_options
FAQ

Frequently Asked Questions about Send From