
WP-EMail Security & Risk Analysis
wordpress.org/plugins/wp-emailAllows people to recommend/send your WordPress blog's post/page to a friend.
Is WP-EMail Safe to Use in 2026?
Generally Safe
Score 88/100WP-EMail has a strong security track record. Known vulnerabilities have been patched promptly.
The "wp-email" plugin version 2.69.2 exhibits a mixed security posture. On the positive side, static analysis reveals no direct critical or high severity taint flows, no dangerous functions, and no external HTTP requests. The plugin also incorporates nonce and capability checks on some of its entry points. However, significant concerns arise from its past vulnerability history, which includes a critical and a high severity vulnerability, alongside several medium ones, pointing to recurring security weaknesses such as authorization bypass, CSRF, XSS, and SQL injection. The static analysis also flags a substantial number of SQL queries, with only 50% using prepared statements, indicating a potential for SQL injection if not handled meticulously across all queries.
Furthermore, a notable weakness is the low percentage of properly escaped outputs (38%), suggesting a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. While the current version has no unpatched CVEs and a seemingly limited attack surface with no unprotected entry points detected in the static analysis, the historical prevalence of critical and high-severity flaws, coupled with the observed issues in SQL query preparation and output escaping, suggests that the plugin has a history of developing exploitable vulnerabilities. The conclusion is that while the plugin has made some improvements in its current version, the historical pattern and current code signals warrant significant caution due to the potential for new vulnerabilities to emerge.
Key Concerns
- History of critical and high severity vulnerabilities
- Low percentage of properly escaped outputs
- 50% of SQL queries not using prepared statements
- Total of 5 known CVEs, indicating past significant issues
- Presence of authorization bypass, CSRF, XSS, SQLi history
WP-EMail Security Vulnerabilities
CVEs by Year
Severity Breakdown
5 total CVEs
WP-EMail <= 2.69.0 - Authenticated (Admin+) Stored Cross-Site Scripting
WP-EMail <= 2.68.2 - Spam Protection Bypass
WP-EMail <= 2.68.2 - Cross-Site Request Forgery to Log Deletion
WP-EMail <= 2.67.2 - Unauthenticated Cross-Site Scripting
WP-EMail < 2.67.2 - SQL Injection
WP-EMail Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
WP-EMail Attack Surface
AJAX Handlers 2
Shortcodes 5
WordPress Hooks 21
Maintenance & Trust
WP-EMail Maintenance & Trust
Maintenance Signals
Community Trust
WP-EMail Alternatives
Email users with custom templates when certain actions happen, such as new posts or updated custom post types and keep a log of sent emails.
Change Mail Sender
cb-change-mail-sender
Easily change the default WordPress from email name and from email address.
Postie
postie
Postie allows you to create posts via email, including many advanced features not found in WordPress's default Post by Email feature.
ShopMagic – email automation
shopmagic-for-woocommerce
Flexible email automation and workflows triggered by customer and site events.
WP Change Default From Email
wp-change-default-from-email
A simple and easy way to change the from email address and from email name that appear on emails sent from WordPress.
WP-EMail Developer Profile
20 plugins · 889K total installs
How We Detect WP-EMail
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-email/email-css.css/wp-content/plugins/wp-email/email-css-rtl.css/wp-content/plugins/wp-email/email-js.js/wp-content/plugins/wp-email/email-js.jswp-email/email-css.css?ver=wp-email/email-css-rtl.css?ver=wp-email/email-js.js?ver=HTML / DOM Fingerprints
WP-EmailIconemail_popup(this.href)emailL10n