SMTP King Pro Security & Risk Analysis

wordpress.org/plugins/smtp-king-pro

Overrides the standard wp_mail function and used SwiftMail via an SMTP connection to send you site mail

10 active installs v1.0.2 PHP + WP 3.0.1+ Updated Jan 12, 2014
301bulk-uploadcsvredirectssimple-301-redirects
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SMTP King Pro Safe to Use in 2026?

Generally Safe

Score 85/100

SMTP King Pro has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The SMTP King Pro v1.0.2 plugin exhibits a mixed security posture. On one hand, it demonstrates strengths by not exposing AJAX handlers, REST API routes, shortcodes, or cron events without proper checks, resulting in zero identified entry points. Furthermore, all SQL queries are properly prepared, and there are no recorded vulnerabilities or CVEs, suggesting a diligent development history or a lack of prior public exposure. However, significant concerns arise from the static code analysis. The presence of two dangerous functions, `unserialize` and `proc_open`, without any apparent nonce or capability checks is a major red flag. Additionally, 100% of output is not properly escaped, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The substantial number of file operations (32) also warrants scrutiny, especially in conjunction with unescaped output and dangerous functions, as it could potentially lead to arbitrary file operations or code execution if these functions are misused or triggered with malicious input.

Key Concerns

  • Dangerous functions used without auth checks
  • Output escaping is completely missing
  • No nonce checks for potential entry points
  • No capability checks for potential entry points
Vulnerabilities
None known

SMTP King Pro Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

SMTP King Pro Release Timeline

v1.0.2Current
v1.0.1
v1.0
Code Analysis
Analyzed Mar 17, 2026

SMTP King Pro Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
24
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
32
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$message = unserialize(file_get_contents($file.'.sending'));packages\swiftmailer\classes\Swift\FileSpool.php:168
proc_open$this->_stream = proc_open($command, $descriptorSpec, $pipes);packages\swiftmailer\classes\Swift\Transport\StreamBuffer.php:285

Output Escaping

0% escaped24 total outputs
Attack Surface

SMTP King Pro Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_enqueue_scriptsincludes\admin_area.php:284
actionadmin_menuincludes\admin_area.php:322
actionadmin_initincludes\admin_area.php:340
filterplugin_action_linkssmtp-king-pro.php:62
actionactivated_pluginsmtp-king-pro.php:75
Maintenance & Trust

SMTP King Pro Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedJan 12, 2014
PHP min version
Downloads2K

Community Trust

Rating60/100
Number of ratings1
Active installs10
Developer Profile

SMTP King Pro Developer Profile

Ash Durham

6 plugins · 170 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SMTP King Pro

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about SMTP King Pro