
Attachment Download On Gravity Form Submission Security & Risk Analysis
wordpress.org/plugins/attachment-download-on-gravity-form-submissionThis plugin provide facility to admin to share document download option after successful form submission.
Is Attachment Download On Gravity Form Submission Safe to Use in 2026?
Generally Safe
Score 100/100Attachment Download On Gravity Form Submission has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "attachment-download-on-gravity-form-submission" plugin version 1.0.0 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices regarding database interactions, with all SQL queries utilizing prepared statements, and a high percentage of output being properly escaped. There are no recorded vulnerabilities (CVEs) for this plugin, suggesting a history of relatively secure development or limited scrutiny. However, significant concerns arise from the attack surface. The plugin exposes two AJAX handlers, neither of which includes any authentication or capability checks. This is a critical oversight, as it means any user, regardless of their role or permissions, can potentially trigger these handlers, creating a substantial risk for unauthorized actions or information disclosure.
Taint analysis shows no unsanitized paths, which is a positive indicator against common injection vulnerabilities. Despite the lack of historical vulnerabilities, the presence of two unprotected AJAX endpoints represents a clear and immediate security risk. The absence of nonce checks further exacerbates this, as it makes the plugin vulnerable to Cross-Site Request Forgery (CSRF) attacks. The plugin's strengths lie in its clean SQL usage and output escaping, but these are overshadowed by the critical deficiency in securing its AJAX endpoints, leading to a notable security risk.
Key Concerns
- 2 unprotected AJAX handlers
- 0 nonce checks
Attachment Download On Gravity Form Submission Security Vulnerabilities
Attachment Download On Gravity Form Submission Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Attachment Download On Gravity Form Submission Attack Surface
AJAX Handlers 2
WordPress Hooks 6
Maintenance & Trust
Attachment Download On Gravity Form Submission Maintenance & Trust
Maintenance Signals
Community Trust
Attachment Download On Gravity Form Submission Alternatives
Gravity Forms Zero Spam
gravity-forms-zero-spam
Enhance your Gravity Forms to include anti-spam measures originally based on the work of David Walsh's "Zero Spam" technique.
Gravity Booster – Styles & Layouts for Gravity Forms
styles-and-layouts-for-gravity-forms
Gravity Booster - Styles and Layouts for Gravity Forms plugin lets you design and style Gravity Forms without CSS coding. You can also use it for addi …
Advanced Custom Fields: Gravity Forms Add-on
acf-gravityforms-add-on
Provides an Advanced Custom Field which allows a WordPress user to select a Gravity Form as part of a field group configuration.
Event Tracking for Gravity Forms
gravity-forms-google-analytics-event-tracking
Easily add event tracking using Gravity Forms and your Google Analytics or Google Tag Manager account. Supports Google Analytics v3 and Gravity Forms …
Gravity PDF
gravity-forms-pdf-extended
Automatically generate, email and download PDF documents from Gravity Forms entries
Attachment Download On Gravity Form Submission Developer Profile
8 plugins · 550 total installs
How We Detect Attachment Download On Gravity Form Submission
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/attachment-download-on-gravity-form-submission/backend/js/wot-admin-scripts.js/wp-content/plugins/attachment-download-on-gravity-form-submission/backend/js/wot-admin-scripts.jsHTML / DOM Fingerprints
wot_attachment_nameremove-attachmentwot_attachment_file_inputgforms_form_settingsname="wot_attachment_form_id"name="wot_attachment_file_input"class="wot_attachment_file_input"name="wot_attachment_name"