WP Mail Debugger Security & Risk Analysis

wordpress.org/plugins/wp-mail-debugger

WP Mail Debugger captures and displays all emails sent through wp_mail() for debugging and troubleshooting.

300 active installs v1.1 PHP 7.2.0+ WP 6.3.0+ Updated Jul 22, 2024
debugemailemail-logtroubleshootingwp-mail
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Mail Debugger Safe to Use in 2026?

Generally Safe

Score 92/100

WP Mail Debugger has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The wp-mail-debugger v1.1 plugin exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of AJAX handlers, REST API routes, shortcodes, cron events, and external HTTP requests significantly reduces its attack surface. Furthermore, the complete lack of known vulnerabilities, including critical and high severity issues, is a very positive indicator. The code analysis shows a commendable use of capability checks (8) and a reasonable proportion of SQL queries employing prepared statements (60%).

However, there are a few areas that warrant attention. The most significant concern is that 100% of the identified outputs are not properly escaped. This creates a substantial risk of Cross-Site Scripting (XSS) vulnerabilities if any user-controllable data is displayed without sanitization. Additionally, while there are capability checks, the static analysis indicates zero nonce checks, which is a missed opportunity for protecting against CSRF attacks, especially if any user-initiated actions were present, even without a large attack surface. The fact that there are no taint flows detected, while generally good, could also be a sign of insufficient taint analysis depth, or simply that the analyzed code paths didn't lend themselves to it.

In conclusion, the plugin is currently in a good state due to its limited attack surface and clean vulnerability history. The lack of external dependencies and its specific function (debugging emails) likely contribute to this. The primary weakness lies in the unescaped output, which introduces a significant XSS risk that should be addressed. The absence of nonce checks is a secondary concern that should also be reviewed.

Key Concerns

  • Unescaped output detected
  • No nonce checks on entry points
Vulnerabilities
None known

WP Mail Debugger Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Mail Debugger Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
6 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
8
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

60% prepared10 total queries

Output Escaping

0% escaped2 total outputs
Attack Surface

WP Mail Debugger Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
filterplugin_row_metasrc\App\AdminPage.php:32
actionnetwork_admin_menusrc\App\AdminPage.php:34
actionadmin_menusrc\App\AdminPage.php:35
actionadmin_enqueue_scriptssrc\App\AdminPage.php:37
actionrest_api_initsrc\App\REST\EmailsController.php:48
actioninitsrc\App\SettingsRegistry.php:20
filterwp_mailsrc\App\WPMailListener.php:40
actionwp_mail_succeededsrc\App\WPMailListener.php:41
actionwp_mail_failedsrc\App\WPMailListener.php:42
actionwp_mail_debugger.sent_mailsrc\App\WPMailListener.php:43
actionadmin_enqueue_scriptssrc\Infrastructure\AssetManager\WPAssetManager.php:46
actionwp_enqueue_scriptssrc\Infrastructure\AssetManager\WPAssetManager.php:47
actionlogin_enqueue_scriptssrc\Infrastructure\AssetManager\WPAssetManager.php:48
actionadmin_noticeswp-mail-debugger.php:25
actionplugins_loadedwp-mail-debugger.php:50
actionadmin_noticeswp-mail-debugger.php:56
Maintenance & Trust

WP Mail Debugger Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedJul 22, 2024
PHP min version7.2.0
Downloads9K

Community Trust

Rating100/100
Number of ratings2
Active installs300
Developer Profile

WP Mail Debugger Developer Profile

Timothy Jacobs

1 plugin · 300 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Mail Debugger

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-mail-debugger/assets/build/index.js/wp-content/plugins/wp-mail-debugger/assets/build/style-index.css
Script Paths
/wp-content/plugins/wp-mail-debugger/assets/build/index.js
Version Parameters
wp-mail-debugger/assets/build/index.js?ver=wp-mail-debugger/assets/build/style-index.css?ver=

HTML / DOM Fingerprints

Data Attributes
data-wp-mail-debugger-admin
JS Globals
window.wpMailDebugger
REST Endpoints
/wp-json/wp-mail-debugger/v1/emails/wp-json/wp-mail-debugger/v1/emails/(?P<uuid>[\w\-]+)/wp-json/wp-mail-debugger/v1/emails/(?P<uuid>[\w\-]+)/send
FAQ

Frequently Asked Questions about WP Mail Debugger