Woo Disposable Emails Security & Risk Analysis

wordpress.org/plugins/woo-disposable-emails

Block disposable email addresses at signup in WooCommerce.

10 active installs v1.2.2 PHP + WP 4.0+ Updated Dec 14, 2016
loginsignupspam
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Woo Disposable Emails Safe to Use in 2026?

Generally Safe

Score 85/100

Woo Disposable Emails has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The static analysis of "woo-disposable-emails" v1.2.2 reveals a plugin with an exceptionally small attack surface. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, meaning there are no direct entry points for external interaction or exploitation. Furthermore, the code analysis shows a strong adherence to secure coding practices, with no dangerous functions, 100% use of prepared statements for SQL queries, and 100% output escaping. The absence of file operations and external HTTP requests further minimizes potential risks. Taint analysis also shows no identified vulnerabilities. The vulnerability history is clean, with no recorded CVEs, suggesting a history of stable and secure development. Overall, the plugin exhibits a robust security posture based on the provided data. The main potential weakness, though not explicitly flagged as a risk in the provided data, is the complete lack of nonces and capability checks. While the current attack surface is zero, this absence of standard WordPress security measures could become a concern if the plugin's functionality were to expand in the future, potentially opening new entry points that are not protected by these crucial security mechanisms.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Woo Disposable Emails Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Woo Disposable Emails Release Timeline

v1.2.2Current
v1.2.1
v1.2
v1.1
Code Analysis
Analyzed Apr 16, 2026

Woo Disposable Emails Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Woo Disposable Emails Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterregistration_errorsincludes/class-disposable-emails.php:29
filterwoocommerce_registration_errorsincludes/class-disposable-emails.php:30
actionplugins_loadedwoo-disposable-emails.php:19
filterwoocommerce_integrationswoo-disposable-emails.php:34
Maintenance & Trust

Woo Disposable Emails Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.33
Last updatedDec 14, 2016
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Woo Disposable Emails Developer Profile

Simon Prosser

6 plugins · 6K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Woo Disposable Emails

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/woo-disposable-emails/assets/css/admin.css/wp-content/plugins/woo-disposable-emails/assets/js/admin.js
Script Paths
/wp-content/plugins/woo-disposable-emails/assets/js/admin.js
Version Parameters
woo-disposable-emails/assets/css/admin.css?ver=woo-disposable-emails/assets/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
wc-disposable-emails-integration-section
FAQ

Frequently Asked Questions about Woo Disposable Emails