
WP Reroute Email Security & Risk Analysis
wordpress.org/plugins/wp-reroute-emailThis plugin reroutes all outgoing emails from a WordPress site (sent using the wp_mail() function) to a predefined configurable email address.
Is WP Reroute Email Safe to Use in 2026?
Generally Safe
Score 98/100WP Reroute Email has a strong security track record. Known vulnerabilities have been patched promptly.
The 'wp-reroute-email' plugin v1.5.2 exhibits a mixed security posture. While the static analysis shows a commendable lack of direct attack surface through AJAX, REST API, shortcodes, or cron events, and a reasonable adherence to prepared statements for SQL queries, there are significant concerns. Specifically, the taint analysis revealed flows with unsanitized paths, and one high-severity taint flow. This, combined with a substantial vulnerability history including three known CVEs (two high, one medium) for Cross-Site Scripting, SQL Injection, and CSRF, strongly suggests a pattern of insecure coding practices in handling user-supplied or external data. The absence of capability checks in the static analysis is also a notable weakness, as it implies that even unprotected entry points (though none are identified here) could be vulnerable.
Despite the absence of unpatched CVEs at present, the plugin's past indicates a recurring tendency towards vulnerabilities that could be exploited by attackers. The high percentage of properly escaped outputs (62%) is a positive sign, but the remaining 38% are a potential source of XSS. The presence of two nonce checks is good, but only two for an unknown number of internal operations is minimal. The lack of direct external HTTP requests is a plus. Overall, while the plugin has mitigated some common WordPress vulnerabilities in this version, the historical pattern and the specific taint analysis findings warrant caution.
Key Concerns
- High severity taint flow found
- Flows with unsanitized paths found
- Past high severity CVEs (2)
- Past medium severity CVEs (1)
- Output escaping not always proper (38% unescaped)
- No capability checks identified
WP Reroute Email Security Vulnerabilities
CVEs by Year
Severity Breakdown
3 total CVEs
WP Reroute Email <= 1.4.9 - Unauthenticated Stored Cross-Site Scripting via Email Subject
WP Reroute Email <= 1.4.6 - Authenticated (Administrator+) SQL Injection
WP Reroute Email <= 1.4.6 - Cross-Site Request Forgery
WP Reroute Email Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
WP Reroute Email Attack Surface
WordPress Hooks 10
Maintenance & Trust
WP Reroute Email Maintenance & Trust
Maintenance Signals
Community Trust
WP Reroute Email Alternatives
Change Administration Email
change-administration-email
Change the Site's Administration Email Address on the General Settings page without the confirmation email.
FS Email Tools
email-tools
Collection of tools to interact with emails in WordPress including email rerouting, outgoing email logging to the database, and automatic BCC to speci …
WP Mail SMTP by WPForms – The Most Popular SMTP and Email Log Plugin
wp-mail-smtp
Make email delivery easy for WordPress. Connect with SMTP, Gmail, Outlook, SendGrid, Mailgun, SES, Zoho, + more. Rated #1 WordPress SMTP Email plugin.
Hostinger Reach – AI-Powered Email Marketing for WordPress
hostinger-reach
Launch and grow your email marketing effortlessly with Hostinger Reach. Collect contacts, sync subscribers, and send emails – all in one, AI powered.
MC4WP: Mailchimp for WordPress
mailchimp-for-wp
The #1 Mailchimp plugin for WordPress. Allows you to add a multitude of newsletter sign-up methods to your site.
WP Reroute Email Developer Profile
2 plugins · 2K total installs
How We Detect WP Reroute Email
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-reroute-email/css/wp-reroute-email-styles.css/wp-content/plugins/wp-reroute-email/js/wp-reroute-email.jswp-reroute-email.jswp-reroute-email-styles.css