Simple AWS SES Mail Security & Risk Analysis

wordpress.org/plugins/simple-ses-mail

Amazon Simple Email Service (SES) is a cost-effective, flexible, and scalable email service

10 active installs v0.0.1 PHP 5.6+ WP 4.0+ Updated Jan 20, 2021
amazon-web-servicesses
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple AWS SES Mail Safe to Use in 2026?

Generally Safe

Score 85/100

Simple AWS SES Mail has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "simple-ses-mail" v0.0.1 plugin exhibits a mixed security posture. On the positive side, it has a small attack surface with all entry points being AJAX handlers and has no known historical vulnerabilities. Furthermore, all SQL queries are properly prepared, and there are no recorded taint flows, indicating a low risk of direct data injection or manipulation through these vectors. The presence of nonce checks on several occasions is also a good practice.

However, there are notable areas of concern. The plugin utilizes the `unserialize()` function, which can be a significant security risk if the data being unserialized is not strictly controlled and validated, potentially leading to Remote Code Execution. Additionally, a substantial portion of the output (32%) is not properly escaped, which could open the door to Cross-Site Scripting (XSS) vulnerabilities. The lack of capability checks on AJAX handlers is another critical oversight, as it implies that any authenticated user, regardless of their role or permissions, could potentially trigger these actions. The bundled Guzzle library, while not explicitly flagged as outdated in the provided data, represents a potential dependency risk if not kept up-to-date.

In conclusion, while the absence of known vulnerabilities and the proper handling of SQL queries are strengths, the presence of `unserialize()`, unescaped output, and a complete lack of capability checks on AJAX handlers present significant security weaknesses. The plugin would require careful review and remediation of these issues to achieve a secure state. The relatively low version number (0.0.1) suggests it might be an early development stage where such omissions are more common but still require immediate attention before wider deployment.

Key Concerns

  • Use of unserialize() function
  • Unescaped output detected
  • Lack of capability checks on AJAX handlers
  • Bundled Guzzle library
Vulnerabilities
None known

Simple AWS SES Mail Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Simple AWS SES Mail Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
6
13 escaped
Nonce Checks
6
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

unserialize$user_data = unserialize($decryption);includes\class-sasm-mail.php:208

Bundled Libraries

Guzzle

Output Escaping

68% escaped19 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
save_options (includes\class-sasm-admin.php:354)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Simple AWS SES Mail Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 3

authwp_ajax_sasm_enable_logsincludes\class-sasm-admin.php:20
authwp_ajax_sasm_clear_logsincludes\class-sasm-admin.php:22
authwp_ajax_sasm_send_testincludes\class-sasm-admin.php:24
WordPress Hooks 6
actioninitincludes\class-sasm-admin.php:14
actionadmin_enqueue_scriptsincludes\class-sasm-admin.php:16
actionadmin_menuincludes\class-sasm-admin.php:18
actionadmin_post_sasm_form_add_detailsincludes\class-sasm-admin.php:26
actionadmin_post_sasm_form_remove_detailsincludes\class-sasm-admin.php:28
actionadmin_post_sasm_form_add_optionsincludes\class-sasm-admin.php:30
Maintenance & Trust

Simple AWS SES Mail Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedJan 20, 2021
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Simple AWS SES Mail Developer Profile

S3Bubble

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple AWS SES Mail

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-aws-ses-mail/assets/admin.css/wp-content/plugins/simple-aws-ses-mail/assets/admin.js
Script Paths
/wp-content/plugins/simple-aws-ses-mail/assets/admin.js
Version Parameters
simple-aws-ses-mail/assets/admin.css?ver=simple-aws-ses-mail/assets/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
sasm-wrap-innersasm-wrap-inner-col-leftsasm-wrap-inner-col-spacesasm-alertnds_add_user_meta_form
Data Attributes
id="nds_add_user_meta_form"name="sasm-email"name="sasm-name"name="sasm-region"name="sasm-key"
JS Globals
sasm_admin
REST Endpoints
/wp-json/sasm-admin/
FAQ

Frequently Asked Questions about Simple AWS SES Mail