WP JV Custom Email Settings Security & Risk Analysis

wordpress.org/plugins/wp-jv-custom-email-settings

Notify users about new posts published and customize your e-mail notification settings

80 active installs v2.6 PHP + WP 4.6+ Updated Feb 16, 2020
adminadministratione-mailemailnewsletter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP JV Custom Email Settings Safe to Use in 2026?

Generally Safe

Score 85/100

WP JV Custom Email Settings has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The wp-jv-custom-email-settings plugin v2.6 presents a mixed security posture. On the positive side, there are no known CVEs associated with the plugin, and it has a limited attack surface with only one AJAX handler, which appears to be protected by authentication checks. Furthermore, the plugin demonstrates good practices by implementing nonce and capability checks, and it does not perform file operations or external HTTP requests, reducing potential attack vectors. However, significant concerns arise from the code analysis. The output escaping is alarmingly low at only 15%, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis reveals a high severity flow with unsanitized paths, suggesting a potential for path traversal or similar issues, even though it's not classified as critical. Additionally, while 56% of SQL queries use prepared statements, 44% do not, which could lead to SQL injection vulnerabilities if those queries handle user-supplied input without proper sanitization. The lack of vulnerability history is a positive indicator, but it doesn't negate the immediate risks identified in the static analysis. The plugin's strengths lie in its limited attack surface and its efforts to implement security checks, but the severe deficiency in output escaping and the high-severity taint flow are critical areas that require immediate attention.

Key Concerns

  • Low percentage of properly escaped output
  • High severity taint flow with unsanitized paths
  • Significant portion of SQL queries not prepared
Vulnerabilities
None known

WP JV Custom Email Settings Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP JV Custom Email Settings Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
5 prepared
Unescaped Output
35
6 escaped
Nonce Checks
2
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

56% prepared9 total queries

Output Escaping

15% escaped41 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

4 flows3 with unsanitized paths
wp_jv_ces_general_settings (wp-jv-custom-email-settings.php:116)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP JV Custom Email Settings Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_wp_jv_ces_send_notification_manualwp-jv-custom-email-settings.php:949
WordPress Hooks 22
actionplugins_loadedwp-jv-custom-email-settings.php:56
actiondelete_postwp-jv-custom-email-settings.php:84
actionadmin_initwp-jv-custom-email-settings.php:87
actionadmin_enqueue_scriptswp-jv-custom-email-settings.php:109
actionshow_user_profilewp-jv-custom-email-settings.php:240
actionedit_user_profilewp-jv-custom-email-settings.php:241
actionpersonal_options_updatewp-jv-custom-email-settings.php:255
actionedit_user_profile_updatewp-jv-custom-email-settings.php:256
actionuser_new_formwp-jv-custom-email-settings.php:261
actionuser_registerwp-jv-custom-email-settings.php:262
filtermanage_users_columnswp-jv-custom-email-settings.php:284
filtermanage_users_custom_columnwp-jv-custom-email-settings.php:285
actionadmin_footer-users.phpwp-jv-custom-email-settings.php:295
actionload-users.phpwp-jv-custom-email-settings.php:296
actionadd_meta_boxeswp-jv-custom-email-settings.php:379
actionadmin_menuwp-jv-custom-email-settings.php:431
filterwp_mail_fromwp-jv-custom-email-settings.php:620
filterwp_mail_from_namewp-jv-custom-email-settings.php:631
filterthe_titlewp-jv-custom-email-settings.php:761
filterwp_mail_content_typewp-jv-custom-email-settings.php:808
actionsave_postwp-jv-custom-email-settings.php:1000
actionadmin_noticeswp-jv-custom-email-settings.php:1012
Maintenance & Trust

WP JV Custom Email Settings Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedFeb 16, 2020
PHP min version
Downloads6K

Community Trust

Rating76/100
Number of ratings6
Active installs80
Developer Profile

WP JV Custom Email Settings Developer Profile

Janos Ver

2 plugins · 280 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP JV Custom Email Settings

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-jv-custom-email-settings/wp-jv-custom-email-settings.min.js
Version Parameters
wp-jv-custom-email-settings.min.js?ver=

HTML / DOM Fingerprints

Data Attributes
id="wp_jv_ces_set_email_from"name="wp_jv_ces_set_email_from"id="wp_jv_ces_set_email_from_address"name="wp_jv_ces_set_email_from_address"id="wp_jv_ces_set_notification_mode"name="wp_jv_ces_set_notification_mode"+6 more
JS Globals
wp_jv_ces_obj
FAQ

Frequently Asked Questions about WP JV Custom Email Settings