SMTP mailer Override Security & Risk Analysis

wordpress.org/plugins/smtp-mailer-override

SMTP Mailer Override Plugin The SMTP Mailer Override plugin is a WordPress plugin that allows you to customize the SMTP server used for sending email …

0 active installs v1.0 PHP + WP 4.5+ Updated May 22, 2024
emailmailsend-emailsmtp
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SMTP mailer Override Safe to Use in 2026?

Generally Safe

Score 92/100

SMTP mailer Override has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "smtp-mailer-override" v1.0 plugin exhibits a strong security posture based on the provided static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points significantly limits the potential attack surface. Furthermore, the code signals indicate excellent development practices, with no dangerous functions, 100% SQL queries using prepared statements, and all outputs being properly escaped. The presence of a nonce check is also a positive indicator. Taint analysis revealing zero flows with unsanitized paths further reinforces this strong security assessment. The plugin also has no recorded vulnerability history, which suggests a history of secure development or a lack of targeted attacks.

While the static analysis is overwhelmingly positive, the absence of capability checks on any potential entry points (though none are identified) could be a theoretical concern if new entry points were to be added in future versions without proper authorization checks. However, based on the current version's analysis, this is not an immediate risk. The plugin appears well-developed from a security perspective, with a minimal attack surface and robust code hygiene. The lack of any identified vulnerabilities or insecure code patterns makes it appear very secure in its current state.

Vulnerabilities
None known

SMTP mailer Override Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SMTP mailer Override Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
16 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped16 total outputs
Attack Surface

SMTP mailer Override Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menusmtp-mailer-override.php:13
actionadmin_initsmtp-mailer-override.php:14
actionphpmailer_initsmtp-mailer-override.php:100
actionadmin_initsmtp-mailer-override.php:131
actionadmin_noticessmtp-mailer-override.php:146
actionadmin_noticessmtp-mailer-override.php:150
actionadmin_noticessmtp-mailer-override.php:155
Maintenance & Trust

SMTP mailer Override Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 22, 2024
PHP min version
Downloads575

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

SMTP mailer Override Developer Profile

proxymis

5 plugins · 150 total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
359 days
View full developer profile
Detection Fingerprints

How We Detect SMTP mailer Override

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about SMTP mailer Override