WP Mail SMTP SendGrid Edition Security & Risk Analysis

wordpress.org/plugins/wp-mail-smtp-sendgrid-edition

Based on WP Mail SMTP. Also adds subject for display on SendGrid Activity Screen.

500 active installs v1.4.0 PHP + WP 2.7+ Updated Jul 23, 2024
mailmailerphpmailersmtpwp_mail
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Mail SMTP SendGrid Edition Safe to Use in 2026?

Generally Safe

Score 92/100

WP Mail SMTP SendGrid Edition has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "wp-mail-smtp-sendgrid-edition" v1.4.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any identified attack surface points (AJAX handlers, REST API routes, shortcodes, cron events) is a significant positive, indicating that the plugin has no readily accessible entry points for unauthorized interaction. Furthermore, the complete absence of dangerous functions, raw SQL queries, and external HTTP requests further bolsters this strong foundation. The presence of a nonce check is also a good sign of basic security consciousness.

However, a significant concern arises from the output escaping analysis. With 100% of outputs not being properly escaped, this presents a considerable risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is displayed by the plugin without proper sanitization could be exploited by attackers to inject malicious scripts, leading to session hijacking, defacement, or other harmful actions. The lack of vulnerability history is positive, suggesting a historically stable plugin, but it does not mitigate the immediate XSS risk posed by the unescaped outputs.

In conclusion, while the plugin has a minimal attack surface and good practices regarding data handling and external interactions, the severe lack of output escaping is a critical weakness. This flaw creates a direct and exploitable path for XSS attacks, which outweighs the positive aspects of the analysis. Addressing the output escaping is paramount to improving the security of this plugin.

Key Concerns

  • 0% of outputs properly escaped
Vulnerabilities
None known

WP Mail SMTP SendGrid Edition Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Mail SMTP SendGrid Edition Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped8 total outputs
Attack Surface

WP Mail SMTP SendGrid Edition Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionphpmailer_initwp_mail_smtp.php:551
filterwhitelist_optionswp_mail_smtp.php:555
actionadmin_menuwp_mail_smtp.php:557
filterplugin_action_linkswp_mail_smtp.php:561
filterwp_mail_fromwp_mail_smtp.php:565
filterwp_mail_from_namewp_mail_smtp.php:566
filterwp_mailwp_mail_smtp.php:569
Maintenance & Trust

WP Mail SMTP SendGrid Edition Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedJul 23, 2024
PHP min version
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs500
Developer Profile

WP Mail SMTP SendGrid Edition Developer Profile

FolioVision

19 plugins · 48K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
1121 days
View full developer profile
Detection Fingerprints

How We Detect WP Mail SMTP SendGrid Edition

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-mail-smtp-sendgrid-edition/wp_mail_smtp.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Mail SMTP SendGrid Edition