
Send From Security & Risk Analysis
wordpress.org/plugins/send-fromPlugin for modifying the from line on all emails coming from WordPress.
Is Send From Safe to Use in 2026?
Generally Safe
Score 99/100Send From has a strong security track record. Known vulnerabilities have been patched promptly.
The 'send-from' v2.5 plugin demonstrates a generally good security posture with several positive indicators. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points is a significant strength, suggesting a limited attack surface. The code also shows a strong commitment to secure database interactions, with 100% of SQL queries using prepared statements. Furthermore, the presence of nonce and capability checks indicates an awareness of WordPress security best practices for authentication and authorization. However, the static analysis reveals a concerning area: 50% of output is not properly escaped. This, combined with taint analysis showing two flows with unsanitized paths, presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities, even if no critical or high severity taint flows were identified in this specific scan.
The plugin's vulnerability history, while showing no currently unpatched CVEs, includes one past vulnerability related to Cross-Site Scripting. The fact that the last vulnerability was recent (April 2025) and was an XSS issue, aligns with the concerns raised by the static analysis regarding unescaped output. This pattern suggests a recurring weakness in handling user-supplied data that could be rendered in the frontend.
In conclusion, 'send-from' v2.5 has a strong foundation in terms of attack surface management and secure database operations. The primary weakness lies in the incomplete output escaping, which, despite the absence of critical taint flows in this analysis, remains a notable risk due to the historical XSS vulnerability and the current static analysis findings. Addressing the unescaped outputs is crucial to mitigating potential XSS attacks.
Key Concerns
- Unescaped output found
- Unsanitized paths in taint flows
- Past XSS vulnerability
Send From Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Send From <= 2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting
Send From Code Analysis
Output Escaping
Data Flow Analysis
Send From Attack Surface
WordPress Hooks 8
Maintenance & Trust
Send From Maintenance & Trust
Maintenance Signals
Community Trust
Send From Alternatives
Site Mailer – SMTP Replacement, Email API Deliverability & Email Log
site-mailer
Effortlessly manage transactional emails with Site Mailer. High deliverability, logs and statistics, and no SMTP plugins needed.
SMTP Mailer
smtp-mailer
Configure a SMTP server to send email from your WordPress site. Configure the wp_mail() function to use SMTP instead of the PHP mail() function.
Stop WP Emails Going to Spam
stop-wp-emails-going-to-spam
Fixes WordPress emails going to spam/junk folders. The default settings often resolve the issue.
WPO365 | MICROSOFT 365 GRAPH MAILER
wpo365-msgraphmailer
Send WordPress emails from a M365 / Exchange Online Mailbox using Microsoft Graph, leveraging OAuth for authentication which is more secure than SMTP
Configure SMTP
configure-smtp
Configure SMTP mailing in WordPress, including support for sending email via SSL/TLS (such as Gmail).
Send From Developer Profile
1 plugin · 600 total installs
How We Detect Send From
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/send-from/css/send-from-admin.css/wp-content/plugins/send-from/js/send-from-admin.js/wp-content/plugins/send-from/js/send-from-admin.jssend-from/css/send-from-admin.css?ver=send-from/js/send-from-admin.js?ver=HTML / DOM Fingerprints
send_from_admin_options