
Wp Hard Mailer Security & Risk Analysis
wordpress.org/plugins/wp-hard-mailerCreate two textareas, one for create a form template and other for a mail template. The form can be putted in posts, pages or sidebars.
Is Wp Hard Mailer Safe to Use in 2026?
Generally Safe
Score 85/100Wp Hard Mailer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wp-hard-mailer" v1.1.2 plugin exhibits a mixed security posture. On the positive side, the plugin has no recorded vulnerabilities (CVEs) and a very small attack surface with no unprotected entry points. The absence of dangerous functions, file operations, and external HTTP requests is also reassuring. However, significant concerns arise from the static analysis of its code. Notably, 100% of outputs are not properly escaped, posing a high risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis also reveals two flows with unsanitized paths, which could lead to various injection attacks if these paths are exposed to user input. Furthermore, the plugin lacks nonce checks and capability checks, leaving its functionality potentially vulnerable to unauthorized actions or privilege escalation, especially considering the potential for injection via unsanitized paths and unescaped output.
While the plugin's vulnerability history is clean, this can be misleading given the identified code weaknesses. The lack of proper output escaping and the presence of unsanitized paths represent critical security flaws that could be exploited even without prior known CVEs. The absence of prepared statements in a significant portion of SQL queries also introduces a risk of SQL injection. In conclusion, despite a clean CVE record and a small attack surface, the "wp-hard-mailer" plugin has critical security deficiencies in output handling and data sanitization that require immediate attention.
Key Concerns
- 0% output escaping
- 2 unsanitized paths in taint analysis
- 0 nonce checks
- 0 capability checks
- 57% SQL queries without prepared statements
Wp Hard Mailer Security Vulnerabilities
Wp Hard Mailer Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Wp Hard Mailer Attack Surface
Shortcodes 1
WordPress Hooks 2
Maintenance & Trust
Wp Hard Mailer Maintenance & Trust
Maintenance Signals
Community Trust
Wp Hard Mailer Alternatives
Kadence WooCommerce Email Designer
kadence-woocommerce-email-designer
Customize the default WooCommerce email templates design and text through the native WordPress customizer. Preview emails and send test emails.
EmailKit – Email Customizer for WooCommerce & WP
emailkit
EmailKit is a powerful WordPress and WooCommerce email customizer tool, free for everyone! It allows users to customize and design templates that show …
YayMail – WooCommerce Email Customizer
yaymail
Customize WooCommerce email templates with an advanced drag-and-drop email builder. Works great with 80+ WooCommerce Email Customizer Addons.
Disable auto-update Email Notifications
disable-auto-update-email-notifications
This plugin performs a simple task of disabling email notifications that are sent by WordPress when a plugin or theme auto-updates.
Email Template Customizer for WooCommerce
email-template-customizer-for-woo
Make your WooCommerce emails become professional.
Wp Hard Mailer Developer Profile
6 plugins · 70 total installs
How We Detect Wp Hard Mailer
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-hard-mailer/style.csswp-hard-mailer/style.css?ver=HTML / DOM Fingerprints
name="wp_hard_mailer_name"name="wp_hard_mailer_mail"name="wp_hard_mailer_fail"name="wp_hard_mailer_success"name="wp_hard_mailer_form"name="wp_hard_mailer_template"[wphm name="