
Xmail – The Right Way Security & Risk Analysis
wordpress.org/plugins/xmail-the-right-wayReplaces wp_mail and sends email the right way so it does not get flagged as SPAM.
Is Xmail – The Right Way Safe to Use in 2026?
Generally Safe
Score 100/100Xmail – The Right Way has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'xmail-the-right-way' v1.10 plugin exhibits a mixed security posture. On one hand, the static analysis reveals no direct entry points exposed via AJAX, REST API, shortcodes, or cron events without authentication or proper callbacks. Furthermore, all SQL queries are safely handled using prepared statements, and there is no history of known vulnerabilities (CVEs), indicating a potentially well-maintained codebase.
However, significant concerns arise from the static analysis. The presence of the 'exec' function is a critical red flag, as it allows for the execution of arbitrary commands on the server. This is compounded by the fact that 100% of output is not properly escaped, meaning that if any data processed by the plugin is later displayed, it could be vulnerable to cross-site scripting (XSS) attacks. The plugin also performs file operations and makes a capability check, but lacks nonce checks, which are crucial for preventing CSRF attacks in many WordPress contexts. The absence of taint analysis data is also a weakness, as it suggests this aspect was not thoroughly evaluated.
In conclusion, while the plugin benefits from a lack of known vulnerabilities and a well-protected attack surface in terms of direct entry points, the critical 'exec' function and the widespread lack of output escaping represent substantial security risks. The absence of nonce checks further adds to potential vulnerabilities. These issues suggest that while direct exploitation might be challenging without a specific context, the potential for privilege escalation or XSS attacks exists if the 'exec' function is improperly utilized or if data is displayed without sanitization. Further investigation into how 'exec' is used and where unescaped output occurs is highly recommended.
Key Concerns
- Dangerous function 'exec' found
- 100% of output not properly escaped
- Missing nonce checks
Xmail – The Right Way Security Vulnerabilities
Xmail – The Right Way Code Analysis
Dangerous Functions Found
Output Escaping
Xmail – The Right Way Attack Surface
WordPress Hooks 1
Maintenance & Trust
Xmail – The Right Way Maintenance & Trust
Maintenance Signals
Community Trust
Xmail – The Right Way Alternatives
WP Mail Logging
wp-mail-logging
Log, view, and resend all emails sent from your WordPress site. Great for resolving email sending issues or keeping a copy for auditing.
ActiveCampaign Postmark for WordPress
postmark-approved-wordpress-plugin
The officially-supported ActiveCampaign Postmark plugin for Wordpress.
SMTP2GO for WordPress – Email Made Easy
smtp2go
Resolve email delivery issues, increase inbox placement, track sent email, get 24/7 support, and real-time reporting.
WPO365 | MICROSOFT 365 GRAPH MAILER
wpo365-msgraphmailer
Send WordPress emails from a M365 / Exchange Online Mailbox using Microsoft Graph, leveraging OAuth for authentication which is more secure than SMTP
YaySMTP and Email Logs: Amazon SES, SendGrid, Outlook, Mailgun, Brevo, Google and Any SMTP Service
yaysmtp
Send WordPress emails successfully with WP Mail SMTP via your favorite mailer
Xmail – The Right Way Developer Profile
1 plugin · 10 total installs
How We Detect Xmail – The Right Way
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.