Stop Emails Security & Risk Analysis

wordpress.org/plugins/stop-emails

Stop all outgoing emails sent from WordPress.

5K active installs v1.2.1 PHP + WP 3.6+ Updated Jan 13, 2026
developmentemail
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Stop Emails Safe to Use in 2026?

Generally Safe

Score 100/100

Stop Emails has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "stop-emails" plugin v1.2.1 exhibits a strong security posture based on the provided static analysis. The complete absence of identified dangerous functions, SQL queries (all using prepared statements), and output escaping issues indicates meticulous coding practices regarding common web vulnerabilities. Furthermore, the lack of file operations and external HTTP requests reduces the potential for exploitation through these vectors.

The vulnerability history is also entirely clean, with no recorded CVEs. This, combined with the static analysis results, suggests that the plugin has been developed with security in mind and has not historically presented significant risks to WordPress installations. The plugin's attack surface is effectively zero, with no entry points identified in AJAX handlers, REST API routes, shortcodes, or cron events. This is a significant strength, as it means there are no immediately obvious ways for an attacker to interact with the plugin's code.

While the absence of vulnerabilities and a small attack surface are highly positive, it's worth noting that the analysis reports zero nonce checks and zero capability checks. In a more complex plugin with exposed entry points, this would be a significant concern. However, given the complete lack of any entry points, this absence does not translate to a direct exploitable risk in this specific instance. The plugin's overall security is excellent due to its minimalist design and lack of vulnerable code patterns.

Key Concerns

  • No capability checks
  • No nonce checks
Vulnerabilities
None known

Stop Emails Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Stop Emails Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Stop Emails Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedstop-emails.php:116
actionfe_stop_emails_logstop-emails.php:117
actionadmin_noticesstop-emails.php:118
actioninitstop-emails.php:119
filterbp_email_use_wp_mailstop-emails.php:124
Maintenance & Trust

Stop Emails Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 13, 2026
PHP min version
Downloads77K

Community Trust

Rating100/100
Number of ratings12
Active installs5K
Developer Profile

Stop Emails Developer Profile

Sal Ferrarello

4 plugins · 5K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Stop Emails

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
stop-emails.php?ver=1.2.1

HTML / DOM Fingerprints

CSS Classes
fe-stop-emails-warning
FAQ

Frequently Asked Questions about Stop Emails