
User Email Compromised Check Security & Risk Analysis
wordpress.org/plugins/user-email-compromised-checkCross check registered user emails with the Have I Been Pwned API for data breaches across a number of popular sites around the internet.
Is User Email Compromised Check Safe to Use in 2026?
Generally Safe
Score 85/100User Email Compromised Check has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "user-email-compromised-check" plugin v1.0 exhibits a seemingly robust security posture in its static analysis, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. This lack of direct entry points significantly reduces the potential attack surface. Furthermore, the absence of dangerous functions and the exclusive use of prepared statements for SQL queries are strong indicators of good security practices. The plugin also avoids file operations and external HTTP requests are minimal.
However, the analysis does reveal areas of concern. A notable weakness is the low percentage of properly escaped output (39%). This indicates that sensitive data displayed to users might be vulnerable to cross-site scripting (XSS) attacks if not properly sanitized by WordPress itself. The presence of a taint flow with unsanitized paths, even if not classified as critical or high severity in this specific analysis, is a red flag that warrants further investigation. The lack of nonce checks and capability checks on any potential, albeit unidentified, entry points also introduces a risk. The plugin's history of zero known vulnerabilities is positive but doesn't guarantee future safety, especially given the identified output escaping and taint flow issues.
In conclusion, while the plugin demonstrates strengths in its limited attack surface and secure SQL practices, the low output escaping rate and the identified unsanitized taint flow represent significant security weaknesses that could be exploited. The absence of any vulnerability history might be due to the plugin's simplicity or lack of widespread use, rather than inherent security. Addressing the output escaping and thoroughly reviewing the unsanitized taint flow are crucial next steps.
Key Concerns
- Low output escaping rate
- Taint flow with unsanitized path
- Missing nonce checks
- Missing capability checks
User Email Compromised Check Security Vulnerabilities
User Email Compromised Check Code Analysis
Output Escaping
Data Flow Analysis
User Email Compromised Check Attack Surface
WordPress Hooks 7
Maintenance & Trust
User Email Compromised Check Maintenance & Trust
Maintenance Signals
Community Trust
User Email Compromised Check Alternatives
Activity Log – Monitor & Record User Changes
aryo-activity-log
This top rated Activity Log plugin helps you monitor & log all changes and actions on your WordPress site, so you can remain secure and organized.
Contact Form Email
contact-form-to-email
Contact form with visual form builder. Contact form that sends the data to email, to a database list and to CSV / Excel files.
Send Users Email – Email Subscribers, Email Marketing Newsletter
send-users-email
Send Users Email provides a way to send email to all system users either by selecting individual users or user roles.
Disable New User Notification Emails
disable-new-user-notifications
This plugin does one thing - disables user registration notification emails.
JSM Show User Metadata
jsm-show-user-meta
Show user metadata in a metabox when editing users - a great tool for debugging issues with user metadata.
User Email Compromised Check Developer Profile
15 plugins · 136K total installs
How We Detect User Email Compromised Check
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/user-email-compromised-check/css/min/ecc-profile-styles.min.css/wp-content/plugins/user-email-compromised-check/css/min/remodal.min.css/wp-content/plugins/user-email-compromised-check/css/min/remodal-default-theme.min.css/wp-content/plugins/user-email-compromised-check/js/min/account-clean.min.js/wp-content/plugins/user-email-compromised-check/js/min/account-compromised.min.js/wp-content/plugins/user-email-compromised-check/js/min/remodal.min.jsjs/min/account-clean.min.jsjs/min/account-compromised.min.jsjs/min/remodal.min.jsuser-email-compromised-check/css/min/ecc-profile-styles.min.css?ver=user-email-compromised-check/css/min/remodal.min.css?ver=user-email-compromised-check/css/min/remodal-default-theme.min.css?ver=user-email-compromised-check/js/min/account-clean.min.js?ver=user-email-compromised-check/js/min/account-compromised.min.js?ver=user-email-compromised-check/js/min/remodal.min.js?ver=HTML / DOM Fingerprints
ecc-account-compromised-modalremodal-margin-topcompromised-report-datahidden-returned-datadata-remodal-id="compromised-email-data"translation