Zoho ZeptoMail Security & Risk Analysis

wordpress.org/plugins/transmail

Zoho ZeptoMail Plugin lets you configure your ZeptoMail account on your WordPress site enabling you to send transactional emails of your site via Zept …

5K active installs v3.3.3 PHP 5.6+ WP 4.8+ Updated Feb 3, 2026
mailmailerphpmailertransactional-emailwp_mail
99
A · Safe
CVEs total1
Unpatched0
Last CVEDec 31, 2025
Safety Verdict

Is Zoho ZeptoMail Safe to Use in 2026?

Generally Safe

Score 99/100

Zoho ZeptoMail has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Dec 31, 2025Updated 3mo ago
Risk Assessment

The 'transmail' v3.3.3 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices in using prepared statements for SQL queries and properly escaping output, which are crucial for preventing common vulnerabilities. The absence of dangerous functions and the low number of file operations and external HTTP requests are also favorable indicators. However, significant concerns arise from the attack surface analysis. The plugin exposes three AJAX handlers, all of which lack authentication checks. This is a serious flaw, as it allows any user, including unauthenticated ones, to potentially trigger these handlers, opening the door for various exploits.

The taint analysis further exacerbates these concerns, revealing four high-severity flows with unsanitized paths. This suggests that user-supplied data is not being adequately validated or sanitized before being used in potentially dangerous operations, which, when combined with the unprotected AJAX endpoints, creates a strong risk of code injection or other malicious manipulations. The vulnerability history, while showing no currently unpatched CVEs, does indicate a past medium-severity vulnerability, specifically Cross-Site Request Forgery (CSRF). While this particular vulnerability is patched, it suggests a historical tendency towards certain types of security weaknesses.

In conclusion, while 'transmail' v3.3.3 has some strengths in its handling of SQL and output, the presence of unprotected AJAX endpoints coupled with high-severity taint flows presents a substantial security risk. The lack of proper authorization on these entry points is a critical oversight that attackers could readily exploit. The past CSRF vulnerability also serves as a reminder that careful auditing and continuous monitoring are essential.

Key Concerns

  • Unprotected AJAX handlers
  • High severity unsanitized taint flows
  • Past medium severity vulnerability
Vulnerabilities
1 published

Zoho ZeptoMail Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-49028medium · 4.3Cross-Site Request Forgery (CSRF)

Zoho ZeptoMail <= 3.3.1 - Cross-Site Request Forgery

Dec 31, 2025 Patched in 3.3.2 (14d)
Version History

Zoho ZeptoMail Release Timeline

v3.3.3Current
v3.3.2
v3.3.11 CVE
v3.3.01 CVE
v3.2.91 CVE
v3.2.81 CVE
v3.2.71 CVE
v3.2.61 CVE
v3.2.51 CVE
v3.2.41 CVE
v3.2.31 CVE
v3.2.21 CVE
v3.2.11 CVE
v3.2.01 CVE
v3.1.41 CVE
v3.1.31 CVE
v3.1.21 CVE
v3.1.11 CVE
v3.1.01 CVE
v3.0.11 CVE
Code Analysis
Analyzed Mar 16, 2026

Zoho ZeptoMail Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
14 prepared
Unescaped Output
8
64 escaped
Nonce Checks
3
Capability Checks
3
File Operations
1
External Requests
1
Bundled Libraries
0

SQL Query Safety

78% prepared18 total queries

Output Escaping

89% escaped72 total outputs
Data Flows · Security
4 unsanitized

Data Flow Analysis

6 flows4 with unsanitized paths
transmail_faild_mail_callback (transMail.php:194)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
3 unprotected

Zoho ZeptoMail Attack Surface

Entry Points3
Unprotected3

AJAX Handlers 3

authwp_ajax_retry_failed_emailtransMail.php:1370
authwp_ajax_delete_failed_emailtransMail.php:1423
authwp_ajax_delete_selected_logstransMail.php:1445
WordPress Hooks 4
actionplugins_loadedtransMail.php:40
actionadmin_enqueue_scriptstransMail.php:58
actionadmin_noticestransMail.php:192
actionadmin_menutransMail.php:746
Maintenance & Trust

Zoho ZeptoMail Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedFeb 3, 2026
PHP min version5.6
Downloads71K

Community Trust

Rating100/100
Number of ratings4
Active installs5K
Developer Profile

Zoho ZeptoMail Developer Profile

Zoho Mail

4 plugins · 25K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
14 days
View full developer profile
Detection Fingerprints

How We Detect Zoho ZeptoMail

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/transmail/assets/css/style.css/wp-content/plugins/transmail/index.js
Script Paths
/wp-content/plugins/transmail/index.js
Version Parameters
transmail/assets/css/style.css?ver=transmail/index.js?ver=

HTML / DOM Fingerprints

CSS Classes
dashicons-email
JS Globals
myAjaxtransmailPluginData
FAQ

Frequently Asked Questions about Zoho ZeptoMail