Vibe BuddyPress Mails via WPMail Security & Risk Analysis

wordpress.org/plugins/vibe-buddypress-to-wp-mail-fix

Send BuddyPress HTML Emails via WordPress Mail system.

80 active installs v1.3 PHP 7.0+ WP 6.0+ Updated Aug 9, 2025
activation-email-not-workingbuddypressemails
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Vibe BuddyPress Mails via WPMail Safe to Use in 2026?

Generally Safe

Score 100/100

Vibe BuddyPress Mails via WPMail has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7mo ago
Risk Assessment

The 'vibe-buddypress-to-wp-mail-fix' plugin version 1.3 presents a mixed security posture. On the positive side, the static analysis reveals no detectable dangerous functions, no external HTTP requests, and all SQL queries utilize prepared statements. Furthermore, the plugin has no recorded vulnerabilities in its history, suggesting a history of secure development or effective patching. The absence of any identified CVEs is a strong indicator of good security practices over time.

However, a significant concern arises from the complete lack of output escaping. With one output identified and none properly escaped, this creates a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data displayed on the frontend without proper sanitization could be exploited by attackers. Additionally, the absence of any nonces or capability checks across all entry points means that any potential vulnerabilities discovered in the future would be easily exploitable by unauthenticated users, as there are no built-in mechanisms to verify user permissions or prevent request forgery.

In conclusion, while the plugin has a clean vulnerability history and avoids common pitfalls like raw SQL, the lack of output escaping and authorization checks on its entry points represents a critical security weakness. The plugin is currently unpatched for XSS due to this oversight, and any future discovery of an exploit would be readily actionable by attackers.

Key Concerns

  • Output escaping is not properly implemented
  • No nonce checks on any entry points
  • No capability checks on any entry points
Vulnerabilities
None known

Vibe BuddyPress Mails via WPMail Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Vibe BuddyPress Mails via WPMail Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Vibe BuddyPress Mails via WPMail Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
filterbp_email_use_wp_mailloader.php:38
filterwp_mail_content_typeloader.php:40
filterbp_email_get_content_plaintextloader.php:41
actionbp_register_admin_settingsloader.php:43
filterwp_mail_fromloader.php:46
filterwp_mail_from_nameloader.php:48
actionplugins_loadedloader.php:113
Maintenance & Trust

Vibe BuddyPress Mails via WPMail Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedAug 9, 2025
PHP min version7.0
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs80
Developer Profile

Vibe BuddyPress Mails via WPMail Developer Profile

VibeThemes

20 plugins · 4K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Vibe BuddyPress Mails via WPMail

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Vibe BuddyPress Mails via WPMail