WP Valid Email Security & Risk Analysis

wordpress.org/plugins/wp-valid-email

WP Valid Email is a WordPress plugin which offers suggestions to users who mis-type their email address when entering it on your website.

10 active installs v.1.0 PHP + WP 3.6+ Updated Dec 19, 2014
check-emailemailemail-checkemail-suggestionemail-validation
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Valid Email Safe to Use in 2026?

Generally Safe

Score 85/100

WP Valid Email has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'wp-valid-email' v.1.0 plugin exhibits a generally good security posture, primarily due to its minimal attack surface and lack of identified critical vulnerabilities in static and taint analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly reduces the potential entry points for attackers. Furthermore, the plugin demonstrates good practices by utilizing prepared statements for all its SQL queries, indicating a strong defense against SQL injection. The presence of a capability check is also a positive sign for access control.

However, a notable concern is the low percentage of properly escaped output (25%). This suggests a potential risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is displayed without adequate sanitization or escaping. While taint analysis did not reveal any critical or high severity flows, this could be an oversight in the analysis or a limitation of the static analysis for this specific plugin. The clean vulnerability history, with no recorded CVEs, is a strong positive indicator, suggesting the plugin has historically been maintained with security in mind.

In conclusion, 'wp-valid-email' v.1.0 is relatively secure due to its limited attack surface and safe SQL handling. The primary weakness lies in the insufficient output escaping, which warrants attention to prevent potential XSS exploits. The lack of historical vulnerabilities is reassuring, but the identified output escaping issue should be addressed to maintain a robust security profile.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

WP Valid Email Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Valid Email Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
3 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

25% escaped12 total outputs
Attack Surface

WP Valid Email Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionwp_enqueue_scriptswp-valid-email-main.php:17
actionwp_headwp-valid-email-main.php:18
actionwp_footerwp-valid-email-main.php:19
actionadmin_menuwp-valid-email-main.php:20
filterplugin_action_linkswp-valid-email-main.php:21
actionlogin_enqueue_scriptswp-valid-email-main.php:22
actionlogin_headwp-valid-email-main.php:23
Maintenance & Trust

WP Valid Email Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedDec 19, 2014
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

WP Valid Email Developer Profile

CoastMountain

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Valid Email

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-valid-email/js/mailcheck.min.js
Script Paths
/wp-content/plugins/wp-valid-email/js/mailcheck.min.js

HTML / DOM Fingerprints

CSS Classes
mmve-valid-email-msg
FAQ

Frequently Asked Questions about WP Valid Email