ThreatPoint Email Validator Security & Risk Analysis

wordpress.org/plugins/threatpoint-email-validator

This plugin validates email in realtime using live connections and aggregated data, by leveraging the ThreatPoint email verification API service.

0 active installs v1.4 PHP 5.4+ WP 3.5.2+ Updated Oct 25, 2023
contact-formemail-checkeremail-validationspambotsstop-spam
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ThreatPoint Email Validator Safe to Use in 2026?

Generally Safe

Score 85/100

ThreatPoint Email Validator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "threatpoint-email-validator" v1.4 plugin exhibits a generally good security posture with no recorded vulnerabilities or critical code signals. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code analysis indicates no dangerous functions, file operations, or raw SQL queries, with all SQL queries using prepared statements. This suggests a strong foundation in secure coding practices.

However, several areas warrant attention. The taint analysis reveals two flows with unsanitized paths, although they are not classified as critical or high severity. While not immediately indicative of a vulnerability, this could represent a potential risk if the plugin's functionality evolves or if external inputs are handled in unexpected ways. Additionally, the output escaping is only properly applied to 41% of outputs, which is a concern. Insufficient output escaping can lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not sanitized before being displayed to other users.

The plugin's vulnerability history is clean, with no known CVEs. This is a positive indicator of its current security state and the development team's attention to security. In conclusion, "threatpoint-email-validator" v1.4 is a relatively secure plugin due to its minimal attack surface and lack of severe code signals. The primary areas for improvement are enhancing output escaping and investigating the unsanitized taint flows to ensure they do not pose a future risk.

Key Concerns

  • Low output escaping (41%)
  • Unsanitized taint flows (2)
Vulnerabilities
None known

ThreatPoint Email Validator Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

ThreatPoint Email Validator Release Timeline

v1.3
vrelease-1.2
vrelease-1.1
vrelease-1.0
Code Analysis
Analyzed Apr 16, 2026

ThreatPoint Email Validator Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

41% escaped17 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
threatpoint_email_risk (Threatpoint-email.php:217)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

ThreatPoint Email Validator Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuThreatpoint-email.php:20
actionadmin_initThreatpoint-email.php:21
filterwpcf7_validate_configurationThreatpoint-email.php:208
filteris_emailThreatpoint-email.php:215
Maintenance & Trust

ThreatPoint Email Validator Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedOct 25, 2023
PHP min version5.4
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

ThreatPoint Email Validator Developer Profile

ThreatPoint UK

2 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ThreatPoint Email Validator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/threatpoint-email-validator/css/style.css/wp-content/plugins/threatpoint-email-validator/js/script.js
Script Paths
/wp-content/plugins/threatpoint-email-validator/js/script.js
Version Parameters
threatpoint-email-validator/css/style.css?ver=threatpoint-email-validator/js/script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about ThreatPoint Email Validator