
WP Custom Emails Security & Risk Analysis
wordpress.org/plugins/wp-custom-emailsEasily customize WordPress notification emails.
Is WP Custom Emails Safe to Use in 2026?
Generally Safe
Score 85/100WP Custom Emails has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wp-custom-emails" v1.2.2 plugin exhibits a generally positive security posture based on the static analysis, with no identified dangerous functions, file operations, or external HTTP requests. The presence of SQL queries that are largely prepared (67%) and a high percentage of properly escaped output (82%) are good indicators of secure coding practices. Furthermore, the plugin has no recorded vulnerabilities (CVEs), which suggests a history of responsible development and patching, or a lack of previous security scrutiny.
However, there are specific areas of concern. The taint analysis revealed two flows with unsanitized paths, both flagged with high severity. This indicates potential vulnerabilities where user-supplied data could be manipulated to affect file paths or other sensitive operations, even without an explicit attack surface being immediately apparent through AJAX, REST API, or shortcodes. The complete absence of nonce and capability checks across all entry points (though the total entry points are zero) is a significant weakness that could be exploited if any attack surface were introduced in future versions or if the current analysis missed any indirect entry points.
In conclusion, while the plugin benefits from a clean vulnerability history and good output escaping, the high-severity taint flows and the complete lack of authorization checks represent notable risks. The absence of direct attack vectors might be misleading, as the taint analysis points to potential underlying issues. Future development should prioritize addressing these taint flows and implementing robust authorization checks on any new or existing entry points.
Key Concerns
- High severity unsanitized path taint flows
- No capability checks found
- No nonce checks found
- SQL queries not fully prepared
- Some output not properly escaped
WP Custom Emails Security Vulnerabilities
WP Custom Emails Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
WP Custom Emails Attack Surface
WordPress Hooks 20
Maintenance & Trust
WP Custom Emails Maintenance & Trust
Maintenance Signals
Community Trust
WP Custom Emails Alternatives
Email Subscribers & Newsletters – Email Marketing, Post Notifications & Newsletter Plugin for WordPress
email-subscribers
Add subscription forms on the website and send newsletters & automatically send post notification about new blog posts once it gets published.
ActiveCampaign Postmark for WordPress
postmark-approved-wordpress-plugin
The officially-supported ActiveCampaign Postmark plugin for Wordpress.
Disable Theme and Plugin Auto-Update Emails
disable-theme-and-plugin-auto-update-emails
Disables the default notification emails sent by a site after an automatic theme and/or plugin update. Simply activate the plugin to disable these ema …
miniOrange OTP Login, Verification and SMS Notifications
miniorange-otp-verification
OTP Verification via Email/SMS/WhatsApp,SMS Notifications for WooCommerce,OTP Login with Phone,PasswordLess Login.Custom Gateway for OTP Verification
Disable New User Notification Emails
disable-new-user-notifications
This plugin does one thing - disables user registration notification emails.
WP Custom Emails Developer Profile
4 plugins · 111K total installs
How We Detect WP Custom Emails
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-custom-emails/assets/js/admin-script.js/wp-content/plugins/wp-custom-emails/assets/css/admin-style.csswp-content/plugins/wp-custom-emails/assets/js/admin-script.jswp-content/plugins/wp-custom-emails/assets/css/admin-style.cssHTML / DOM Fingerprints
wtbp-ce-hidden-field