WP-Feedmail Security & Risk Analysis

wordpress.org/plugins/wp-feedmail

It displays a form in the widget area which allows to subscribe to Google Feedburner Directly. It also stores the subscribers list in the database.

10 active installs v1.1.1 PHP + WP 2.7+ Updated Jan 22, 2013
feed-subscriptionfeedburner-pluginfeedburner-widget-for-wordpressgoogle-feedburnerwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Feedmail Safe to Use in 2026?

Generally Safe

Score 85/100

WP-Feedmail has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The wp-feedmail plugin v1.1.1, based on the static analysis, exhibits a generally good security posture with several positive indicators. Notably, all SQL queries are prepared, which significantly mitigates the risk of SQL injection vulnerabilities. The absence of dangerous functions, file operations, and external HTTP requests also reduces the potential attack vectors. The plugin also demonstrates an effort towards security by including a capability check.

However, there are significant concerns regarding output sanitization and a lack of nonce checks. The very low percentage of properly escaped outputs (9%) suggests a high likelihood of Cross-Site Scripting (XSS) vulnerabilities, as user-provided data is likely being rendered without adequate sanitization. The taint analysis revealing flows with unsanitized paths further corroborates this. The complete absence of nonce checks, especially if the shortcode can be influenced by user input, presents an open door for Cross-Site Request Forgery (CSRF) attacks. The vulnerability history being clean is a positive sign, but it does not negate the risks identified in the current code analysis. The limited attack surface is a strength, but the identified weaknesses within that surface are serious.

In conclusion, while wp-feedmail has made strides in areas like SQL query security, the critical shortcomings in output escaping and nonce verification expose it to significant XSS and CSRF risks. These issues, if exploited, could lead to serious compromise of user accounts and the WordPress site. The absence of past vulnerabilities should not lead to complacency, given the current code quality concerns.

Key Concerns

  • Low percentage of properly escaped output
  • Taint flows with unsanitized paths
  • No nonce checks
Vulnerabilities
None known

WP-Feedmail Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP-Feedmail Release Timeline

v1.1.1?
v1.0.1?
Code Analysis
Analyzed Apr 16, 2026

WP-Feedmail Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
20
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

9% escaped22 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
show_feedmail_form (wp-feedmail.php:171)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP-Feedmail Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[casper-feedmail] wp-feedmail.php:47
WordPress Hooks 8
actionadmin_menuwp-feedmail.php:42
actionadmin_initwp-feedmail.php:43
actioninitwp-feedmail.php:44
actioninitwp-feedmail.php:45
actionplugins_loadedwp-feedmail.php:46
filterplugin_action_linkswp-feedmail.php:160
actionwidgets_initwp-feedmail.php:261
actionplugins_loadedwp-feedmail.php:276
Maintenance & Trust

WP-Feedmail Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedJan 22, 2013
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP-Feedmail Developer Profile

Vipin P.G

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-Feedmail

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-feedmail/css/wp-feedmail-style.css/wp-content/plugins/wp-feedmail/js/wp-feedmail-script.js
Script Paths
/wp-content/plugins/wp-feedmail/js/wp-feedmail-script.js
Version Parameters
wp-feedmail/css/wp-feedmail-style.css?ver=wp-feedmail/js/wp-feedmail-script.js?ver=

HTML / DOM Fingerprints

CSS Classes
feedmail-form
Data Attributes
id="feedmail_addsub"id="response1"id="response2"
Shortcode Output
<div class="feedmail-form"><p><form name="feedmail_addsub" id="feedmail_addsub" method="post"<input name="fsub_name" type="text" placeholder="Name">
FAQ

Frequently Asked Questions about WP-Feedmail