SMTP Cycle Email Security & Risk Analysis

wordpress.org/plugins/smtp-cycle-email

Using this plugin, you can send email to different users using various SMTP servers with spinning text feature.

10 active installs v0.2 PHP + WP 2.9.2+ Updated Apr 22, 2016
cycleemailsmtpsmtp-cycle-emailspin-text
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SMTP Cycle Email Safe to Use in 2026?

Generally Safe

Score 85/100

SMTP Cycle Email has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "smtp-cycle-email" plugin v0.2 exhibits a mixed security posture. On the positive side, it has a minimal attack surface with no reported CVEs, no bundled libraries, and no external HTTP requests, which are all good indicators. The plugin also demonstrates a commendable effort in using prepared statements for the vast majority of its SQL queries.

However, significant concerns arise from the static analysis. A critical finding is the high percentage of improperly escaped output, with only 5% being properly handled. This indicates a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the website. Furthermore, the taint analysis reveals 3 high-severity flows with unsanitized paths, suggesting potential vulnerabilities related to how user-supplied data is processed or used, which could lead to unintended behavior or exploits if not handled with extreme care.

The absence of any recorded vulnerability history is a positive sign, but it does not negate the risks identified in the code analysis. The lack of nonces and capability checks on entry points, though the number of entry points is zero, is a general best practice that is not being followed. Given the identified output escaping issues and high-severity taint flows, the plugin's current state presents notable risks that require immediate attention.

Key Concerns

  • High percentage of unescaped output
  • High severity taint flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

SMTP Cycle Email Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

SMTP Cycle Email Release Timeline

v0.2Current
v0.1
Code Analysis
Analyzed Mar 16, 2026

SMTP Cycle Email Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
15 prepared
Unescaped Output
42
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

83% prepared18 total queries

Output Escaping

5% escaped44 total outputs
Data Flows · Security
5 unsanitized

Data Flow Analysis

5 flows5 with unsanitized paths
smtp_cp_schedule_message (smtp-cycle-email.php:753)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

SMTP Cycle Email Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_enqueue_scriptssmtp-cycle-email.php:50
actionadmin_menusmtp-cycle-email.php:251
actionadmin_initsmtp-cycle-email.php:264
actionplugins_loadedsmtp-cycle-email.php:886
Maintenance & Trust

SMTP Cycle Email Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedApr 22, 2016
PHP min version
Downloads4K

Community Trust

Rating60/100
Number of ratings1
Active installs10
Developer Profile

SMTP Cycle Email Developer Profile

CyberNetikz

5 plugins · 31K total installs

72
trust score
Avg Security Score
90/100
Avg Patch Time
967 days
View full developer profile
Detection Fingerprints

How We Detect SMTP Cycle Email

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/smtp-cycle-email/smtp-cycle-email.php
Version Parameters
smtp-cycle-email/css/admin-style.css?ver=1.0

HTML / DOM Fingerprints

CSS Classes
cn_admin_banner
HTML Comments
<!-- ... -->
Data Attributes
target="_blank"
FAQ

Frequently Asked Questions about SMTP Cycle Email