ThorMail Client Security & Risk Analysis

wordpress.org/plugins/thormail-client

The Ultimate Delivery Platform. Official WordPress client for ThorMail (Self-Hosted). Connect your WordPress site to your own email infrastructure.

0 active installs v1.0.3 PHP 7.4+ WP 5.7+ Updated Mar 2, 2026
apiemailsmtpthormailtransactional
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ThorMail Client Safe to Use in 2026?

Generally Safe

Score 100/100

ThorMail Client has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "thormail-client" v1.0.3 plugin exhibits a generally good security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Code signals also indicate strong adherence to best practices, with 100% of SQL queries utilizing prepared statements and a high rate of output escaping. The presence of nonce and capability checks further reinforces secure development practices.

However, a notable concern arises from the taint analysis, which identified one flow with an unsanitized path. While no critical or high severity issues were flagged, this single unsanitized path presents a potential avenue for unexpected behavior or vulnerabilities if an attacker can control the input feeding this flow. Additionally, the plugin makes one external HTTP request, which, while not inherently a vulnerability, warrants careful review to ensure the target is trustworthy and the request is handled securely.

The vulnerability history is clean, with no known CVEs, which is a very positive sign. This suggests a history of responsible development and patching. In conclusion, while the plugin demonstrates strong security fundamentals and a clean vulnerability record, the single unsanitized path in the taint analysis is the primary area of concern and should be addressed to further strengthen its security.

Key Concerns

  • Flow with unsanitized path detected
  • External HTTP request made by plugin
Vulnerabilities
None known

ThorMail Client Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

ThorMail Client Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
40 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

91% escaped44 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
render_page (includes\class-thormail-admin.php:237)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

ThorMail Client Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_menuincludes\class-thormail-admin.php:19
actionadmin_initincludes\class-thormail-admin.php:20
actionadmin_enqueue_scriptsincludes\class-thormail-admin.php:21
actionadmin_post_thormail_send_testincludes\class-thormail-admin.php:22
filterpre_wp_mailincludes\class-thormail-mailer.php:34
actionplugins_loadedthormail.php:51
Maintenance & Trust

ThorMail Client Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 2, 2026
PHP min version7.4
Downloads93

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

ThorMail Client Developer Profile

Jose Canchila (Jodacame)

5 plugins · 330 total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ThorMail Client

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/thormail-client/assets/css/admin.css
Version Parameters
thormail-client/assets/css/admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
thormail-input
Data Attributes
pPlaceholder
FAQ

Frequently Asked Questions about ThorMail Client