SpoofMail Security & Risk Analysis

wordpress.org/plugins/spoofmail

Validate an email address' structure, check MX-Records and check against known spoof/temporary email domains.

10 active installs v1.0.0 PHP + WP 3.0+ Updated Sep 17, 2012
emailemail-checkemail-validatefake-emailspoof
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is SpoofMail Safe to Use in 2026?

Generally Safe

Score 85/100

SpoofMail has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "spoofmail" v1.0.0 plugin exhibits a strong security posture based on the provided static analysis and vulnerability history. The complete absence of identified entry points (AJAX, REST API, shortcodes, cron) is a significant strength, as it drastically limits the plugin's attack surface. Furthermore, the fact that all SQL queries utilize prepared statements indicates good practice in preventing SQL injection vulnerabilities. The lack of known CVEs and a clean vulnerability history suggests a well-maintained or unexploited plugin. However, the static analysis does highlight two areas of concern. The presence of file operations without further context is a potential risk, as is the fact that 100% of observed output is not properly escaped. This could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is directly reflected in the output. While the current lack of identified taint flows is positive, the unescaped outputs represent a latent risk that could be exploited if a vulnerable taint flow were introduced in a future version or discovered through more advanced analysis. In conclusion, "spoofmail" v1.0.0 has a generally good security profile due to its limited attack surface and secure database practices, but the unescaped outputs and file operations warrant attention to mitigate potential XSS and file manipulation risks.

Key Concerns

  • Output not properly escaped
  • File operations present without context
Vulnerabilities
None known

SpoofMail Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

SpoofMail Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

SpoofMail Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

SpoofMail Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_enqueue_scriptsspoofmail.php:138
Maintenance & Trust

SpoofMail Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedSep 17, 2012
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

SpoofMail Developer Profile

ray.viljoen

6 plugins · 390 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SpoofMail

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/spoofmail/domains.json/wp-content/plugins/spoofmail/spoofmail.js
Script Paths
/wp-content/plugins/spoofmail/spoofmail.js

HTML / DOM Fingerprints

JS Globals
verificationURL
FAQ

Frequently Asked Questions about SpoofMail