Ajax Contact Form Security & Risk Analysis

wordpress.org/plugins/ajax-contact-form

This plugin sends mail using ajax and gather email list, have options page, custom css and form design usability.

20 active installs v1.0 PHP + WP 3.0+ Updated Sep 6, 2011
wordpress-ajax-contact-form-pluginwordpress-ajax-formwordpress-contact-formwordpress-plugin-ajax-contact-formwordpress-plugin-contact-form
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ajax Contact Form Safe to Use in 2026?

Generally Safe

Score 85/100

Ajax Contact Form has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The 'ajax-contact-form' v1.0 plugin exhibits a concerning security posture due to a significant number of critical vulnerabilities identified in static and taint analysis. While there is no recorded vulnerability history, suggesting a lack of known public exploits, the internal code analysis reveals substantial risks. The presence of two AJAX handlers without authentication checks creates a direct attack surface for unauthorized actions. Furthermore, the taint analysis indicating 5 flows with unsanitized paths and a critical severity for all of them is highly alarming, pointing to potential for arbitrary code execution or data compromise. The complete absence of prepared statements for SQL queries and proper output escaping, with 100% of SQL queries and outputs being vulnerable, dramatically amplifies these risks, making the plugin highly susceptible to SQL injection and cross-site scripting (XSS) attacks. The lack of any capability or nonce checks further exacerbates the insecurity.

Key Concerns

  • AJAX handlers without auth checks
  • Critical taint flow with unsanitized paths
  • Raw SQL queries without prepared statements
  • Output escaping is not properly handled
  • Missing nonce checks on AJAX handlers
  • Missing capability checks on AJAX handlers
Vulnerabilities
None known

Ajax Contact Form Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Ajax Contact Form Code Analysis

Dangerous Functions
0
Raw SQL Queries
10
0 prepared
Unescaped Output
33
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared10 total queries

Output Escaping

0% escaped33 total outputs
Data Flows
5 unsanitized

Data Flow Analysis

5 flows5 with unsanitized paths
update_contact_dform (design_form.php:51)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Ajax Contact Form Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

authwp_ajax_ajaxcfajaxcf.php:191
noprivwp_ajax_ajaxcfajaxcf.php:192

Shortcodes 1

[ajaxcf] ajaxcf.php:304
WordPress Hooks 5
actionplugins_loadedajaxcf.php:17
actionplugins_loadedajaxcf.php:42
actionadmin_menuajaxcf.php:134
actionadmin_initajaxcf.php:143
actionwp_headajaxcf.php:173
Maintenance & Trust

Ajax Contact Form Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedSep 6, 2011
PHP min version
Downloads21K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Ajax Contact Form Developer Profile

Richard Gigs

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Ajax Contact Form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ajax-contact-form/style.css
Script Paths
/wp-content/plugins/ajax-contact-form/ajaxcf.js
Version Parameters
ajax-contact-form/style.css?ver=ajaxcf.js?ver=

HTML / DOM Fingerprints

JS Globals
the_ajax_script
Shortcode Output
ajax_contact_form
FAQ

Frequently Asked Questions about Ajax Contact Form