SMTP Security & Risk Analysis

wordpress.org/plugins/smtp

Allows you to configure and use a SMTP server (such as Gmail) for sending emails.

700 active installs v1.1.2 PHP + WP 3.0+ Updated Nov 28, 2017
emailmailmailersmtpwp_mail
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SMTP Safe to Use in 2026?

Generally Safe

Score 85/100

SMTP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "smtp" plugin version 1.1.2 exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The absence of any entry points in the attack surface, including AJAX handlers, REST API routes, shortcodes, and cron events, significantly reduces the potential for direct exploitation. Furthermore, the code signals indicate a good practice of using prepared statements for all SQL queries and a lack of dangerous functions, file operations, or external HTTP requests, all of which are positive indicators. The plugin also has no recorded vulnerability history, which is an excellent sign of its stability and security over time.

However, a significant concern arises from the extremely low rate of proper output escaping (14%). This suggests that data displayed to users may not be adequately sanitized, potentially leaving the plugin vulnerable to cross-site scripting (XSS) attacks if user-supplied data is ever rendered directly. While the static analysis did not identify any specific taint flows or immediate vulnerabilities related to this, the high potential for XSS is a critical weakness. The lack of nonce checks and capability checks, while seemingly mitigated by the zero attack surface, would become a severe concern if any new entry points were introduced in future versions without proper security implementations. Therefore, while the current design minimizes exposure, the inadequate output escaping presents a notable risk that should be addressed.

Key Concerns

  • Insufficient output escaping
Vulnerabilities
None known

SMTP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

SMTP Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

SMTP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

14% escaped7 total outputs
Attack Surface

SMTP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedsmtp.php:21
actionadmin_menusmtp.php:59
filterplugin_action_linkssmtp.php:65
actionadmin_initsmtp.php:142
actionphpmailer_initsmtp.php:228
Maintenance & Trust

SMTP Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedNov 28, 2017
PHP min version
Downloads82K

Community Trust

Rating50/100
Number of ratings4
Active installs700
Developer Profile

SMTP Developer Profile

soso

1 plugin · 700 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SMTP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrapoptiontableform-table
Data Attributes
name="smtp_options[host]"name="smtp_options[port]"name="smtp_options[smtp_secure]"name="smtp_options[username]"name="smtp_options[password]"placeholder="••••••••••"+1 more
FAQ

Frequently Asked Questions about SMTP