Maileon for WordPress Security & Risk Analysis

wordpress.org/plugins/xqueue-maileon

Subscribe contacts with your Maileon account as newsletter recipients.

100 active installs v2.16.3 PHP 5.6+ WP 4.2+ Updated Oct 31, 2024
emailmaileonmarketingxqxqueue
92
A · Safe
CVEs total1
Unpatched0
Last CVEOct 16, 2023
Download
Safety Verdict

Is Maileon for WordPress Safe to Use in 2026?

Generally Safe

Score 92/100

Maileon for WordPress has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Oct 16, 2023Updated 1yr ago
Risk Assessment

The xqueue-maileon plugin exhibits a mixed security posture. While it demonstrates strong adherence to secure coding practices such as using prepared statements for all SQL queries and properly escaping a high percentage of its output, significant concerns remain regarding its attack surface. A substantial portion of its AJAX handlers lack authentication checks, presenting a direct pathway for unauthenticated attackers to interact with plugin functionalities. The absence of any identified taint flows or critical/high severity vulnerabilities in the recent static analysis is positive, but it's crucial to note the plugin has a history of medium-severity Cross-Site Scripting (XSS) vulnerabilities, with the most recent one being in late 2023. The fact that there are currently no unpatched vulnerabilities is a testament to ongoing maintenance, but the pattern of past XSS issues coupled with unprotected AJAX endpoints suggests a potential for future exploitation if not addressed proactively. The plugin's strengths lie in its SQL handling and output sanitization, but the unprotected entry points and historical vulnerability trend warrant careful consideration.

Key Concerns

  • Unprotected AJAX handlers
  • Medium severity vulnerability history (XSS)
Vulnerabilities
1 published

Maileon for WordPress Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2023-46068medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Maileon <= 2.16.0 - Authenticated (Administrator+) Stored Cross-Site Scripting

Oct 16, 2023 Patched in 2.16.1 (99d)
Version History

Maileon for WordPress Release Timeline

v1.01 CVE
Code Analysis
Analyzed Mar 16, 2026

Maileon for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
255 escaped
Nonce Checks
2
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

96% escaped266 total outputs
Attack Surface
4 unprotected

Maileon for WordPress Attack Surface

Entry Points6
Unprotected4

AJAX Handlers 4

noprivwp_ajax_maileon_close_footermaileon-plugin.php:55
authwp_ajax_maileon_close_footermaileon-plugin.php:56
authwp_ajax_xq_subscriptionmaileon-plugin.php:121
noprivwp_ajax_xq_subscriptionmaileon-plugin.php:122

Shortcodes 2

[maileon-contact-update] class\class-xq-maileon-profile-update.php:66
[maileon-contact] class\class-xq-maileon.php:66
WordPress Hooks 14
actionadmin_enqueue_scriptsclass\class-xq-maileon-admin.php:59
actionwp_enqueue_scriptsclass\class-xq-maileon-profile-update.php:64
actionwp_enqueue_scriptsclass\class-xq-maileon.php:64
actionplugins_loadedmaileon-plugin.php:31
actioninitmaileon-plugin.php:41
actionadmin_menumaileon-plugin.php:47
actionadmin_initmaileon-plugin.php:48
actioninitmaileon-plugin.php:50
actioninitmaileon-plugin.php:52
actionwp_footermaileon-plugin.php:54
actionxq_maileon_captchamaileon-plugin.php:57
actioninitmaileon-plugin.php:78
actionadmin_noticesmaileon-plugin.php:88
actionwidgets_initmaileon-plugin.php:118
Maintenance & Trust

Maileon for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.0
Last updatedOct 31, 2024
PHP min version5.6
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Maileon for WordPress Developer Profile

xqintegrations

1 plugin · 100 total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
99 days
View full developer profile
Detection Fingerprints

How We Detect Maileon for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/xqueue-maileon/css/jquery-ui.css/wp-content/plugins/xqueue-maileon/js/jquery-ui.js/wp-content/plugins/xqueue-maileon/js/script.js/wp-content/plugins/xqueue-maileon/js/maileon-subscribe.js/wp-content/plugins/xqueue-maileon/js/maileon-profile-update.js
Script Paths
jquery-ui-tabs
Version Parameters
xqueue-maileon/css/jquery-ui.css?ver=xqueue-maileon/js/jquery-ui.js?ver=xqueue-maileon/js/script.js?ver=xqueue-maileon/js/maileon-subscribe.js?ver=xqueue-maileon/js/maileon-profile-update.js?ver=

HTML / DOM Fingerprints

CSS Classes
xqError
HTML Comments
<!-- Maileon Newsletter Subscription --><!-- End Sidebar -->
Data Attributes
data-maileon-id
JS Globals
maileon_subscribe_configmaileon_profile_update_config
Shortcode Output
[maileon_subscribe][maileon_profile_update]
FAQ

Frequently Asked Questions about Maileon for WordPress