TrueMail Email Validator Security & Risk Analysis

wordpress.org/plugins/truemail-email-validator

TrueMail plugin can be seamlessly integrated with all forms to verify the user email address in real-time before submission.

10 active installs v1.0.0 PHP + WP 4.6+ Updated Sep 14, 2020
email-validationemail-verificationemail-verifieremail-verifyreal-time-form-validation
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is TrueMail Email Validator Safe to Use in 2026?

Generally Safe

Score 85/100

TrueMail Email Validator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The plugin "truemail-email-validator" v1.0.0 demonstrates a strong security posture from a static analysis perspective, showing no identified attack surface, dangerous functions, or unescaped output. The absence of direct SQL queries and file operations further strengthens this assessment. The plugin also has no known vulnerabilities or CVEs recorded, indicating a historically secure development.

However, the complete lack of observed taint flows and the zero capability checks, nonce checks, and unprotected entry points raise a flag. While this could indicate exceptionally clean code, it's also possible that the analysis tools did not cover all potential code paths, or that the plugin's functionality is so limited that these security measures were deemed unnecessary by the developer. The low number of output escalations (33% properly escaped) is a minor concern, though the total count is low.

Overall, the plugin appears secure based on the provided data, with no immediate red flags. The primary area for attention would be to ensure that the limited output escaping, while applied to a small number of outputs, is consistently robust. Given the lack of any identified vulnerabilities or complex code, the current version is likely safe, but ongoing vigilance is always recommended.

Key Concerns

  • Output escaping is not fully implemented
Vulnerabilities
None known

TrueMail Email Validator Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

TrueMail Email Validator Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped3 total outputs
Attack Surface

TrueMail Email Validator Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initincludes\tmp-functions.php:8
actionadmin_initincludes\tmp-functions.php:9
actionadmin_initincludes\tmp-functions.php:10
actionadmin_menuincludes\tmp-functions.php:71
filteris_emailincludes\tmp-functions.php:72
Maintenance & Trust

TrueMail Email Validator Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedSep 14, 2020
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

TrueMail Email Validator Developer Profile

TrueMail.io

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect TrueMail Email Validator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/truemail-email-validator/assets/css/truemail-email-validator.css/wp-content/plugins/truemail-email-validator/assets/js/truemail-email-validator.js
Script Paths
/wp-content/plugins/truemail-email-validator/assets/js/truemail-email-validator.js
Version Parameters
truemail-email-validator/assets/css/truemail-email-validator.css?ver=truemail-email-validator/assets/js/truemail-email-validator.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about TrueMail Email Validator