User Email Compromised Check Security & Risk Analysis

wordpress.org/plugins/user-email-compromised-check

Cross check registered user emails with the Have I Been Pwned API for data breaches across a number of popular sites around the internet.

10 active installs v1.0 PHP + WP 4.0+ Updated Apr 13, 2016
breachdataemailhackuser
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is User Email Compromised Check Safe to Use in 2026?

Generally Safe

Score 85/100

User Email Compromised Check has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "user-email-compromised-check" plugin v1.0 exhibits a seemingly robust security posture in its static analysis, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. This lack of direct entry points significantly reduces the potential attack surface. Furthermore, the absence of dangerous functions and the exclusive use of prepared statements for SQL queries are strong indicators of good security practices. The plugin also avoids file operations and external HTTP requests are minimal.

However, the analysis does reveal areas of concern. A notable weakness is the low percentage of properly escaped output (39%). This indicates that sensitive data displayed to users might be vulnerable to cross-site scripting (XSS) attacks if not properly sanitized by WordPress itself. The presence of a taint flow with unsanitized paths, even if not classified as critical or high severity in this specific analysis, is a red flag that warrants further investigation. The lack of nonce checks and capability checks on any potential, albeit unidentified, entry points also introduces a risk. The plugin's history of zero known vulnerabilities is positive but doesn't guarantee future safety, especially given the identified output escaping and taint flow issues.

In conclusion, while the plugin demonstrates strengths in its limited attack surface and secure SQL practices, the low output escaping rate and the identified unsanitized taint flow represent significant security weaknesses that could be exploited. The absence of any vulnerability history might be due to the plugin's simplicity or lack of widespread use, rather than inherent security. Addressing the output escaping and thoroughly reviewing the unsanitized taint flow are crucial next steps.

Key Concerns

  • Low output escaping rate
  • Taint flow with unsanitized path
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

User Email Compromised Check Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

User Email Compromised Check Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

39% escaped18 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<user-email-compromised-check> (user-email-compromised-check.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

User Email Compromised Check Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_headuser-email-compromised-check.php:31
filteradmin_footer-users.phpuser-email-compromised-check.php:33
actionload-users.phpuser-email-compromised-check.php:35
filtermanage_users_columnsuser-email-compromised-check.php:37
actionmanage_users_custom_columnuser-email-compromised-check.php:39
actionadmin_enqueue_scriptsuser-email-compromised-check.php:41
actionadmin_noticesuser-email-compromised-check.php:43
Maintenance & Trust

User Email Compromised Check Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedApr 13, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

User Email Compromised Check Developer Profile

Evan Herman

15 plugins · 136K total installs

68
trust score
Avg Security Score
84/100
Avg Patch Time
375 days
View full developer profile
Detection Fingerprints

How We Detect User Email Compromised Check

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/user-email-compromised-check/css/min/ecc-profile-styles.min.css/wp-content/plugins/user-email-compromised-check/css/min/remodal.min.css/wp-content/plugins/user-email-compromised-check/css/min/remodal-default-theme.min.css/wp-content/plugins/user-email-compromised-check/js/min/account-clean.min.js/wp-content/plugins/user-email-compromised-check/js/min/account-compromised.min.js/wp-content/plugins/user-email-compromised-check/js/min/remodal.min.js
Script Paths
js/min/account-clean.min.jsjs/min/account-compromised.min.jsjs/min/remodal.min.js
Version Parameters
user-email-compromised-check/css/min/ecc-profile-styles.min.css?ver=user-email-compromised-check/css/min/remodal.min.css?ver=user-email-compromised-check/css/min/remodal-default-theme.min.css?ver=user-email-compromised-check/js/min/account-clean.min.js?ver=user-email-compromised-check/js/min/account-compromised.min.js?ver=user-email-compromised-check/js/min/remodal.min.js?ver=

HTML / DOM Fingerprints

CSS Classes
ecc-account-compromised-modalremodal-margin-topcompromised-report-datahidden-returned-data
Data Attributes
data-remodal-id="compromised-email-data"
JS Globals
translation
FAQ

Frequently Asked Questions about User Email Compromised Check