Upgrade Notification by Email Security & Risk Analysis

wordpress.org/plugins/upgrade-notification-by-email

Sends daily notofication at admins' email if installation of Wordpress is out of date

10 active installs v0.4 PHP + WP 2.0.2+ Updated Jun 21, 2010
mailnotificationsecurityupgrade
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Upgrade Notification by Email Safe to Use in 2026?

Generally Safe

Score 85/100

Upgrade Notification by Email has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "upgrade-notification-by-email" v0.4 plugin exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, SQL queries without prepared statements, and unescaped output are all positive indicators. The plugin also shows no file operations or external HTTP requests, further reducing its attack surface. Importantly, there are no recorded vulnerabilities (CVEs) for this plugin, suggesting a history of stable and secure development.

The static analysis reveals a minimal attack surface with no unprotected entry points. The lack of AJAX handlers, REST API routes, or shortcodes that lack authentication or permission checks is a significant strength. The presence of a single cron event is noted, but without further information on its execution context, its security impact is difficult to assess definitively. Similarly, the absence of nonce and capability checks on the identified entry points is a potential area for concern, although with zero unprotected entry points, this might be a consequence of the limited attack surface rather than an oversight.

Overall, the plugin appears to be well-coded from a security perspective, with a clear emphasis on secure coding practices and a clean vulnerability history. The primary areas for attention, albeit minor given the current analysis, would be to ensure robust security for the cron event and to verify the necessity and implementation of any potential nonce or capability checks if the attack surface were to expand in future versions. The current version, v0.4, seems secure.

Key Concerns

  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Upgrade Notification by Email Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Upgrade Notification by Email Release Timeline

v0.2
Code Analysis
Analyzed Mar 16, 2026

Upgrade Notification by Email Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Upgrade Notification by Email Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwpu_my_daily_eventupgrade-notification-by-email.php:35

Scheduled Events 1

wpu_my_daily_event
Maintenance & Trust

Upgrade Notification by Email Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedJun 21, 2010
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Upgrade Notification by Email Developer Profile

kkarpieszuk

5 plugins · 4K total installs

92
trust score
Avg Security Score
88/100
Avg Patch Time
5 days
View full developer profile
Detection Fingerprints

How We Detect Upgrade Notification by Email

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Upgrade Notification by Email