Well-Handled Email Templates Security & Risk Analysis

wordpress.org/plugins/well-handled

Build, manage, preview, send, and track complex transactional email templates from WordPress.

50 active installs v2.4.5 PHP 7.3+ WP 4.7+ Updated Apr 15, 2025
cssemailemail-templateshandlebarmustache
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Well-Handled Email Templates Safe to Use in 2026?

Generally Safe

Score 100/100

Well-Handled Email Templates has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11mo ago
Risk Assessment

The 'well-handled' v2.4.5 plugin presents a mixed security posture. On the positive side, it has no recorded vulnerabilities (CVEs), a clean taint analysis with no critical or high severity flows, and a relatively small attack surface with no unprotected entry points. This indicates a generally good development effort in avoiding known exploit patterns and common security flaws.

However, significant concerns arise from the static analysis. The plugin performs 8 SQL queries, none of which utilize prepared statements, exposing it to SQL injection risks. Furthermore, only a small fraction (7%) of its extensive output operations are properly escaped, indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. The absence of nonce and capability checks across all entry points is also a major weakness, allowing for potential Cross-Site Request Forgery (CSRF) and privilege escalation attacks, especially if any future functionality introduces sensitive operations. The single file operation also warrants attention, though its context is unknown.

Despite the lack of historical vulnerabilities, the identified code-level weaknesses are substantial and represent critical risks. The absence of prepared statements for SQL and the pervasive lack of output escaping are particularly concerning. While the plugin's attack surface is currently small and lacks unprotected direct entry points, these underlying code flaws could be easily exploited if an attacker finds a way to trigger the vulnerable code paths. The overall security is therefore significantly compromised by these fundamental coding errors.

Key Concerns

  • All SQL queries lack prepared statements
  • Low percentage of properly escaped output
  • No nonce checks found
  • No capability checks found
  • Presence of file operations
Vulnerabilities
None known

Well-Handled Email Templates Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Well-Handled Email Templates Code Analysis

Dangerous Functions
0
Raw SQL Queries
8
0 prepared
Unescaped Output
273
19 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared8 total queries

Output Escaping

7% escaped292 total outputs
Attack Surface

Well-Handled Email Templates Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wh-fragment] bootstrap.php:49
WordPress Hooks 23
actionadmin_noticesbootstrap-fallback.php:96
actionadmin_initbootstrap-fallback.php:125
actionadd_meta_boxesbootstrap.php:24
actionadmin_enqueue_scriptsbootstrap.php:25
actionadmin_headbootstrap.php:26
actionadmin_initbootstrap.php:27
actionadmin_noticesbootstrap.php:28
actionadmin_noticesbootstrap.php:29
actionadmin_noticesbootstrap.php:30
actionall_admin_noticesbootstrap.php:31
actioninitbootstrap.php:32
actioninitbootstrap.php:33
actioninitbootstrap.php:34
actioninitbootstrap.php:35
actioninitbootstrap.php:36
actionparse_requestbootstrap.php:37
actionplugins_loadedbootstrap.php:38
actionquery_varsbootstrap.php:39
actionsave_post_wh-templatebootstrap.php:40
filtercron_schedulesbootstrap.php:43
filtermap_meta_capbootstrap.php:44
filterwh_mail_recipient_emailbootstrap.php:45
filterwh_mail_recipient_namebootstrap.php:46
Maintenance & Trust

Well-Handled Email Templates Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 15, 2025
PHP min version7.3
Downloads8K

Community Trust

Rating100/100
Number of ratings3
Active installs50
Developer Profile

Well-Handled Email Templates Developer Profile

Blobfolio

4 plugins · 2K total installs

78
trust score
Avg Security Score
98/100
Avg Patch Time
1122 days
View full developer profile
Detection Fingerprints

How We Detect Well-Handled Email Templates

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/well-handled/css/admin.css/wp-content/plugins/well-handled/css/admin-vue.css/wp-content/plugins/well-handled/css/build.css/wp-content/plugins/well-handled/css/theme.css/wp-content/plugins/well-handled/js/admin.js/wp-content/plugins/well-handled/js/admin-vue.js/wp-content/plugins/well-handled/js/build.js/wp-content/plugins/well-handled/js/theme.js
Script Paths
/wp-content/plugins/well-handled/js/admin.js/wp-content/plugins/well-handled/js/admin-vue.js/wp-content/plugins/well-handled/js/build.js/wp-content/plugins/well-handled/js/theme.js
Version Parameters
/wp-content/plugins/well-handled/css/admin.css?ver=/wp-content/plugins/well-handled/css/admin-vue.css?ver=/wp-content/plugins/well-handled/css/build.css?ver=/wp-content/plugins/well-handled/css/theme.css?ver=/wp-content/plugins/well-handled/js/admin.js?ver=/wp-content/plugins/well-handled/js/admin-vue.js?ver=/wp-content/plugins/well-handled/js/build.js?ver=/wp-content/plugins/well-handled/js/theme.js?ver=

HTML / DOM Fingerprints

CSS Classes
wh-admin-activity
HTML Comments
<!-- Well-Handled Email Templates --><!-- Well-Handled --><!-- Well-Handled - Bootstrap --><!-- Admin: Activity -->
JS Globals
window.whvar wh_adminvar wh_admin_vue
REST Endpoints
/wp-json/wh/v1/activity
FAQ

Frequently Asked Questions about Well-Handled Email Templates