WP Change Default From Email Security & Risk Analysis

wordpress.org/plugins/wp-change-default-from-email

A simple and easy way to change the from email address and from email name that appear on emails sent from WordPress.

10K active installs v1.1.6 PHP 5.2.4+ WP 2.7+ Updated Jun 23, 2024
change-default-from-emailchange-from-emailemailwp-default-emailwp-email
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Change Default From Email Safe to Use in 2026?

Generally Safe

Score 92/100

WP Change Default From Email has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin "wp-change-default-from-email" v1.1.6 exhibits a generally good security posture with no recorded vulnerabilities or critical taint flows. The plugin also demonstrates sound practices by utilizing prepared statements for all SQL queries and implementing a nonce check on its single AJAX entry point.

However, a significant concern arises from the complete lack of output escaping across all 20 detected outputs. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected and executed within the WordPress admin area or on the frontend, depending on where these outputs are rendered. While there are no explicit capability checks mentioned, the single AJAX handler is protected, which mitigates some direct attack vectors. The absence of a vulnerability history is positive, suggesting responsible development, but it does not excuse the critical oversight in output sanitization.

In conclusion, while the plugin avoids common pitfalls like raw SQL and unauthenticated entry points, the pervasive issue of unescaped output represents a serious security weakness that requires immediate attention. This oversight could be exploited to compromise user sessions or deface websites.

Key Concerns

  • All outputs are unescaped
Vulnerabilities
None known

WP Change Default From Email Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Change Default From Email Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
20
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped20 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
save_settings (admin\WCDFE_Admin.php:76)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Change Default From Email Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_wcdfe_save_settingsadmin\WCDFE_Admin.php:45
WordPress Hooks 8
actionadmin_enqueue_scriptsadmin\WCDFE_Admin.php:43
actionadmin_menuadmin\WCDFE_Admin.php:44
actionplugins_loadedadmin\WCDFE_Admin.php:112
actioninitWCDFE.php:64
filterplugin_row_metaWCDFE.php:99
filterwp_mail_fromWCDFE.php:102
filterwp_mail_from_nameWCDFE.php:105
actionplugins_loadedWCDFE.php:175
Maintenance & Trust

WP Change Default From Email Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedJun 23, 2024
PHP min version5.2.4
Downloads128K

Community Trust

Rating96/100
Number of ratings21
Active installs10K
Developer Profile

WP Change Default From Email Developer Profile

Subodh Ghulaxe

6 plugins · 14K total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Change Default From Email

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-change-default-from-email/assets/css/admin.css
Version Parameters
wp-change-default-from-email/style.css?ver=wp-change-default-from-email/admin/assets/js/admin.js?ver=

HTML / DOM Fingerprints

JS Globals
wcdfe_ajax_object
FAQ

Frequently Asked Questions about WP Change Default From Email