Xmail – The Right Way Security & Risk Analysis

wordpress.org/plugins/xmail-the-right-way

Replaces wp_mail and sends email the right way so it does not get flagged as SPAM.

10 active installs v1.10 PHP + WP 3.0+ Updated Unknown
emailmailsmtpspamwp_mail
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Xmail – The Right Way Safe to Use in 2026?

Generally Safe

Score 100/100

Xmail – The Right Way has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'xmail-the-right-way' v1.10 plugin exhibits a mixed security posture. On one hand, the static analysis reveals no direct entry points exposed via AJAX, REST API, shortcodes, or cron events without authentication or proper callbacks. Furthermore, all SQL queries are safely handled using prepared statements, and there is no history of known vulnerabilities (CVEs), indicating a potentially well-maintained codebase.

However, significant concerns arise from the static analysis. The presence of the 'exec' function is a critical red flag, as it allows for the execution of arbitrary commands on the server. This is compounded by the fact that 100% of output is not properly escaped, meaning that if any data processed by the plugin is later displayed, it could be vulnerable to cross-site scripting (XSS) attacks. The plugin also performs file operations and makes a capability check, but lacks nonce checks, which are crucial for preventing CSRF attacks in many WordPress contexts. The absence of taint analysis data is also a weakness, as it suggests this aspect was not thoroughly evaluated.

In conclusion, while the plugin benefits from a lack of known vulnerabilities and a well-protected attack surface in terms of direct entry points, the critical 'exec' function and the widespread lack of output escaping represent substantial security risks. The absence of nonce checks further adds to potential vulnerabilities. These issues suggest that while direct exploitation might be challenging without a specific context, the potential for privilege escalation or XSS attacks exists if the 'exec' function is improperly utilized or if data is displayed without sanitization. Further investigation into how 'exec' is used and where unescaped output occurs is highly recommended.

Key Concerns

  • Dangerous function 'exec' found
  • 100% of output not properly escaped
  • Missing nonce checks
Vulnerabilities
None known

Xmail – The Right Way Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Xmail – The Right Way Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

exec@exec($exec, $output);xmail.php:342

Output Escaping

0% escaped1 total outputs
Attack Surface

Xmail – The Right Way Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menuxmail.php:406
Maintenance & Trust

Xmail – The Right Way Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Xmail – The Right Way Developer Profile

transilvlad

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Xmail – The Right Way

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Xmail – The Right Way