SMTP for Sendinblue – YaySMTP Security & Risk Analysis

wordpress.org/plugins/smtp-sendinblue

Send emails from WordPress through Sendinblue using SMTP by YayCommerce

300 active installs v1.3.1 PHP 5.3+ WP 4.0+ Updated Jul 12, 2025
brevologsendinbluesendinblue-smtpwp-smtp
97
A · Safe
CVEs total2
Unpatched0
Last CVEJul 16, 2025
Safety Verdict

Is SMTP for Sendinblue – YaySMTP Safe to Use in 2026?

Generally Safe

Score 97/100

SMTP for Sendinblue – YaySMTP has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

2 known CVEsLast CVE: Jul 16, 2025Updated 10mo ago
Risk Assessment

The smtp-sendinblue plugin v1.3.1 presents a mixed security posture. On the positive side, the static analysis reveals a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication. The code also demonstrates good practices with a high percentage of SQL queries using prepared statements and properly escaped output. The presence of nonce and capability checks, though limited, is also a positive sign.

However, concerns arise from the plugin's vulnerability history. Two known CVEs, one high and one medium severity, have been reported, indicating past weaknesses in handling SQL injection and Cross-Site Scripting vulnerabilities. While there are no currently unpatched vulnerabilities, the history suggests a tendency for these types of issues to emerge. The presence of file operations and external HTTP requests, while not inherently problematic, could be vectors for exploitation if not meticulously secured. The use of bundled libraries, such as PHPMailer, warrants attention as outdated versions of these can introduce vulnerabilities.

In conclusion, while the current version appears to have a controlled attack surface and good basic coding practices, the historical presence of critical vulnerability types necessitates ongoing vigilance. The limited number of vulnerability history points (2) and the absence of currently unpatched issues are strengths. The primary weakness lies in the past occurrence of SQL injection and XSS, which require careful code auditing and a robust patching strategy. The plugin's security can be considered moderate, with room for improvement to mitigate the risks indicated by its history.

Key Concerns

  • High severity unpatched CVE
  • Medium severity unpatched CVE
  • Bundled library (PHPMailer) potential risk
  • SQL queries not using prepared statements
  • Output not properly escaped
Vulnerabilities
2 published

SMTP for Sendinblue – YaySMTP Security Vulnerabilities

CVEs by Year

2 CVEs in 2025
2025
Patched Has unpatched

Severity Breakdown

High
1
Medium
1

2 total CVEs

CVE-2025-48161medium · 4.9Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

YaySMTP <= 1.3 - Authenticated (Administrator+) SQL Injection

Jul 16, 2025 Patched in 1.3.1 (7d)
CVE-2025-0953high · 7.2Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

SMTP for Sendinblue – YaySMTP <= 1.2 - Unauthenticated Stored Cross-Site Scripting via Email Logs

Feb 22, 2025 Patched in 1.3 (48d)
Version History

SMTP for Sendinblue – YaySMTP Release Timeline

Code Analysis
Analyzed Mar 16, 2026

SMTP for Sendinblue – YaySMTP Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
13 prepared
Unescaped Output
5
37 escaped
Nonce Checks
1
Capability Checks
2
File Operations
8
External Requests
1
Bundled Libraries
1

Bundled Libraries

PHPMailer

SQL Query Safety

81% prepared16 total queries

Output Escaping

88% escaped42 total outputs
Attack Surface

SMTP for Sendinblue – YaySMTP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actioninitincludes\I18n.php:18
actionadmin_menuincludes\Page\Settings.php:25
actionadmin_enqueue_scriptsincludes\Page\Settings.php:29
actionphpmailer_initincludes\PluginCore.php:28
filterwp_mail_fromincludes\PluginCore.php:29
filterwp_mail_from_nameincludes\PluginCore.php:30
filtercron_schedulesincludes\Schedule.php:21
actionplugins_loadedyay-smtp.php:88
Maintenance & Trust

SMTP for Sendinblue – YaySMTP Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJul 12, 2025
PHP min version5.3
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs300
Developer Profile

SMTP for Sendinblue – YaySMTP Developer Profile

YayCommerce

16 plugins · 78K total installs

77
trust score
Avg Security Score
97/100
Avg Patch Time
126 days
View full developer profile
Detection Fingerprints

How We Detect SMTP for Sendinblue – YaySMTP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/smtp-sendinblue/assets/css/yay-smtp-admin.css/wp-content/plugins/smtp-sendinblue/assets/js/yay-smtp-admin.js/wp-content/plugins/smtp-sendinblue/assets/js/purify.min.js
Script Paths
/wp-content/plugins/smtp-sendinblue/assets/js/yay-smtp-admin.js/wp-content/plugins/smtp-sendinblue/assets/js/purify.min.js
Version Parameters
smtp-sendinblue/assets/css/yay-smtp-admin.css?ver=smtp-sendinblue/assets/js/yay-smtp-admin.js?ver=smtp-sendinblue/assets/js/purify.min.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-yaysmtp-page-id
JS Globals
yay_smtp_sendinblue_wp_data
FAQ

Frequently Asked Questions about SMTP for Sendinblue – YaySMTP