Vanilla Bean – Error Mailer Security & Risk Analysis

wordpress.org/plugins/vanilla-bean-errormailer

Monitor your website, plugins and themes.

10 active installs v3.11 PHP + WP 4.0+ Updated Mar 13, 2022
debugerrorerror-mailexception-emailexception-handler
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Vanilla Bean – Error Mailer Safe to Use in 2026?

Generally Safe

Score 85/100

Vanilla Bean – Error Mailer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The vanilla-bean-errormailer plugin, version 3.11, exhibits a generally strong security posture based on the provided static analysis. The plugin has no recorded vulnerabilities (CVEs) and demonstrates good practices in several areas, including the absence of dangerous functions, all SQL queries utilizing prepared statements, and no external HTTP requests. The limited attack surface with no identified entry points, combined with the presence of capability checks, further strengthens its security. However, a significant concern arises from the output escaping, where only 39% of outputs are properly escaped. This indicates a potential for cross-site scripting (XSS) vulnerabilities if user-controlled data is not meticulously handled before being displayed.

The taint analysis shows no identified flows, which is a positive indicator. Similarly, the lack of known CVEs and a clean vulnerability history suggests a well-maintained and secure plugin. The absence of critical or high-severity issues in the code signals is also encouraging. The plugin's strengths lie in its secure handling of database interactions and external communications, as well as its minimal exposure points. The primary weakness identified is the insufficient output escaping, which warrants careful attention and potential remediation to fully secure the plugin against XSS threats.

Key Concerns

  • Insufficient output escaping
Vulnerabilities
None known

Vanilla Bean – Error Mailer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Vanilla Bean – Error Mailer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
27
17 escaped
Nonce Checks
0
Capability Checks
3
File Operations
2
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

39% escaped44 total outputs
Attack Surface

Vanilla Bean – Error Mailer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedinc\install.php:179
actionadmin_menuvanillabean-errormailer.php:64
actionadmin_initvanillabean-errormailer.php:86
Maintenance & Trust

Vanilla Bean – Error Mailer Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedMar 13, 2022
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Vanilla Bean – Error Mailer Developer Profile

vsmash

5 plugins · 70 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Vanilla Bean – Error Mailer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/vanilla-bean-errormailer/vicon.png

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Vanilla Bean – Error Mailer