WP Custom Emails Security & Risk Analysis

wordpress.org/plugins/wp-custom-emails

Easily customize WordPress notification emails.

100 active installs v1.2.2 PHP + WP 3.5+ Updated Nov 12, 2016
emaillost-passwordmailnotificationspingback
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WP Custom Emails Safe to Use in 2026?

Generally Safe

Score 85/100

WP Custom Emails has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "wp-custom-emails" v1.2.2 plugin exhibits a generally positive security posture based on the static analysis, with no identified dangerous functions, file operations, or external HTTP requests. The presence of SQL queries that are largely prepared (67%) and a high percentage of properly escaped output (82%) are good indicators of secure coding practices. Furthermore, the plugin has no recorded vulnerabilities (CVEs), which suggests a history of responsible development and patching, or a lack of previous security scrutiny.

However, there are specific areas of concern. The taint analysis revealed two flows with unsanitized paths, both flagged with high severity. This indicates potential vulnerabilities where user-supplied data could be manipulated to affect file paths or other sensitive operations, even without an explicit attack surface being immediately apparent through AJAX, REST API, or shortcodes. The complete absence of nonce and capability checks across all entry points (though the total entry points are zero) is a significant weakness that could be exploited if any attack surface were introduced in future versions or if the current analysis missed any indirect entry points.

In conclusion, while the plugin benefits from a clean vulnerability history and good output escaping, the high-severity taint flows and the complete lack of authorization checks represent notable risks. The absence of direct attack vectors might be misleading, as the taint analysis points to potential underlying issues. Future development should prioritize addressing these taint flows and implementing robust authorization checks on any new or existing entry points.

Key Concerns

  • High severity unsanitized path taint flows
  • No capability checks found
  • No nonce checks found
  • SQL queries not fully prepared
  • Some output not properly escaped
Vulnerabilities
None known

WP Custom Emails Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Custom Emails Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
2 prepared
Unescaped Output
8
37 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

67% prepared3 total queries

Output Escaping

82% escaped45 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
send_confirmation_on_profile_email (includes\wpms\wpms.php:115)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Custom Emails Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 20
actionadmin_menuincludes\admin\admin.php:39
actionadmin_enqueue_scriptsincludes\admin\admin.php:42
actionwtbp_ce_settings_after_validationincludes\admin\admin.php:45
filterwtbp_ce_messageincludes\core\core.php:66
filterwtbp_ce_message_bypassincludes\core\core.php:67
filterwp_mail_from_nameincludes\core\core.php:70
filterwp_mail_fromincludes\core\core.php:71
filterwp_mail_content_typeincludes\core\core.php:79
filterretrieve_password_messageincludes\core\core.php:84
filterretrieve_password_titleincludes\core\core.php:85
filtercomment_moderation_textincludes\core\core.php:89
filtercomment_moderation_subjectincludes\core\core.php:90
filtercomment_notification_textincludes\core\core.php:93
filtercomment_notification_subjectincludes\core\core.php:94
filterwtbp_ce_settingsincludes\core\settings.php:18
filterwtbp_ce_settings_tabsincludes\core\settings.php:19
actionadmin_initincludes\settings\settings.php:50
actionupdate_option_new_admin_emailincludes\wpms\wpms.php:51
actionadd_option_new_admin_emailincludes\wpms\wpms.php:52
actionpersonal_options_updateincludes\wpms\wpms.php:62
Maintenance & Trust

WP Custom Emails Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedNov 12, 2016
PHP min version
Downloads4K

Community Trust

Rating90/100
Number of ratings4
Active installs100
Developer Profile

WP Custom Emails Developer Profile

Damian Góra

4 plugins · 111K total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
282 days
View full developer profile
Detection Fingerprints

How We Detect WP Custom Emails

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-custom-emails/assets/js/admin-script.js/wp-content/plugins/wp-custom-emails/assets/css/admin-style.css
Script Paths
wp-content/plugins/wp-custom-emails/assets/js/admin-script.jswp-content/plugins/wp-custom-emails/assets/css/admin-style.css

HTML / DOM Fingerprints

CSS Classes
wtbp-ce-hidden-field
FAQ

Frequently Asked Questions about WP Custom Emails