
wpMandrill Multisite Security & Risk Analysis
wordpress.org/plugins/wpmandrill-multisiteAutomatically propagates the wpMandrill settings from the main site to all subsites, still allowing each subsite to manually override them.
Is wpMandrill Multisite Safe to Use in 2026?
Generally Safe
Score 85/100wpMandrill Multisite has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
Based on the provided static analysis and vulnerability history, the 'wpmandrill-multisite' plugin v1.0.3 exhibits a strong security posture. The static analysis reveals no identified entry points such as AJAX handlers, REST API routes, shortcodes, or cron events that are exposed to potential attacks. Furthermore, the code signals indicate a complete absence of dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, and a concerning lack of nonce and capability checks across all analyzed code paths. This suggests a robustly developed plugin that adheres to many WordPress security best practices.
The taint analysis also shows no identified flows with unsanitized paths, reinforcing the conclusion that there are no apparent code-level vulnerabilities in this version. The vulnerability history is equally positive, with zero known CVEs, unpatched vulnerabilities, or recorded common vulnerability types. This lack of past security issues further bolsters confidence in the plugin's current security state. However, the absence of nonce and capability checks, while not directly leading to exploitable issues in this specific analysis, represents a potential weakness that could be exploited if new entry points were introduced or existing ones were overlooked in a future update. This lack of these checks is a missed opportunity to enhance security layers.
In conclusion, the 'wpmandrill-multisite' plugin v1.0.3 appears to be highly secure with no exploitable vulnerabilities detected in this analysis. Its zero-attack surface, clean code signals, and lack of vulnerability history are significant strengths. The primary, albeit minor, area for improvement lies in the implementation of nonce and capability checks to add an extra layer of defense and ensure forward compatibility with evolving WordPress security standards. The overall risk associated with this plugin is therefore very low.
Key Concerns
- Missing nonce checks
- Missing capability checks
wpMandrill Multisite Security Vulnerabilities
wpMandrill Multisite Release Timeline
wpMandrill Multisite Code Analysis
wpMandrill Multisite Attack Surface
WordPress Hooks 1
Maintenance & Trust
wpMandrill Multisite Maintenance & Trust
Maintenance Signals
Community Trust
wpMandrill Multisite Alternatives
Send Emails with Mandrill
send-emails-with-mandrill
'Send Emails with Mandrill' sends emails that are generated by WordPress through Mandrill, a transactional email service powered by MailChimp.
ActiveCampaign Postmark for WordPress
postmark-approved-wordpress-plugin
The officially-supported ActiveCampaign Postmark plugin for Wordpress.
SMTP2GO for WordPress – Email Made Easy
smtp2go
Resolve email delivery issues, increase inbox placement, track sent email, get 24/7 support, and real-time reporting.
Zoho Mail for WordPress
zoho-mail
Zoho Mail Plugin lets you configure your Zoho Mail account on your WordPress site enabling you to send the email via Zoho Mail API.
WPO365 | MICROSOFT 365 GRAPH MAILER
wpo365-msgraphmailer
Send WordPress emails from a M365 / Exchange Online Mailbox using Microsoft Graph, leveraging OAuth for authentication which is more secure than SMTP
wpMandrill Multisite Developer Profile
8 plugins · 4K total installs
How We Detect wpMandrill Multisite
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wpmandrill-multisite/wpmandrill-multisite.phpHTML / DOM Fingerprints
wp_mandrill_multisite