Authyo OTP for Forminator Form Security & Risk Analysis

wordpress.org/plugins/authyo-otp-for-forminator-form

Secure your Forminator forms with Authyo OTP Verification (Email, SMS, WhatsApp, Voice).

0 active installs v1.0.3 PHP 7.4+ WP 5.6+ Updated Unknown
email-otpform-otpforminator-formphone-otp
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Authyo OTP for Forminator Form Safe to Use in 2026?

Generally Safe

Score 100/100

Authyo OTP for Forminator Form has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The authyo-otp-for-forminator-form plugin v1.0.3 demonstrates a strong security posture based on the provided static analysis. All identified entry points (AJAX handlers and REST API routes) appear to have appropriate authentication and permission checks, which is a significant strength. The code also shows excellent practice regarding SQL queries, with 100% using prepared statements, and a high level of output escaping (92%). The absence of dangerous functions, file operations, and any recorded vulnerabilities in its history further bolsters this positive assessment.

While the overall picture is good, there are a couple of minor points to consider. The plugin makes 6 external HTTP requests, and while not explicitly stated as a risk in the analysis, the nature of these requests and how they are handled warrants attention to prevent potential vulnerabilities like SSRF if not implemented securely. Similarly, with 9 AJAX handlers and 5 capability checks, it's important to ensure that the logic within these handlers is robust and that the capability checks are consistently applied to prevent privilege escalation or unauthorized actions, although the analysis did not uncover specific issues here.

In conclusion, the plugin exhibits good security practices, particularly in its handling of entry points and data sanitization. The lack of known vulnerabilities is a very positive indicator. The primary areas for vigilance would be the secure implementation of external HTTP requests and a continued focus on maintaining robust authorization checks within its handlers. The absence of critical findings in the taint analysis is reassuring.

Key Concerns

  • External HTTP requests present
Vulnerabilities
None known

Authyo OTP for Forminator Form Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Authyo OTP for Forminator Form Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
83 escaped
Nonce Checks
8
Capability Checks
5
File Operations
0
External Requests
6
Bundled Libraries
0

Output Escaping

92% escaped90 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
create_admin_page (includes\class-authyo-admin.php:142)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Authyo OTP for Forminator Form Attack Surface

Entry Points9
Unprotected0

AJAX Handlers 7

authwp_ajax_authyo_forminator_submit_deactivation_feedbackincludes\class-authyo-deactivation.php:25
authwp_ajax_authyo_forminator_submit_email_subscriptionincludes\class-authyo-deactivation.php:38
authwp_ajax_authyo_forminator_dismiss_email_subscriptionincludes\class-authyo-deactivation.php:39
authwp_ajax_authyo_send_otpincludes\class-authyo-forminator.php:20
noprivwp_ajax_authyo_send_otpincludes\class-authyo-forminator.php:21
authwp_ajax_authyo_verify_otpincludes\class-authyo-forminator.php:23
noprivwp_ajax_authyo_verify_otpincludes\class-authyo-forminator.php:24

REST API Routes 2

POST/wp-json/authyo-forminator/v1/deactivation-feedbackincludes\class-authyo-deactivation.php:180
POST/wp-json/authyo-forminator/v1/settings-save-trackingincludes\class-authyo-deactivation.php:187
WordPress Hooks 13
actionadmin_menuincludes\class-authyo-admin.php:13
actionadmin_initincludes\class-authyo-admin.php:14
actionadmin_enqueue_scriptsincludes\class-authyo-admin.php:15
filterwp_redirectincludes\class-authyo-admin.php:17
actionadmin_enqueue_scriptsincludes\class-authyo-deactivation.php:22
actionrest_api_initincludes\class-authyo-deactivation.php:28
actionupdate_option_authyo_forminator_settingsincludes\class-authyo-deactivation.php:32
actionadd_option_authyo_forminator_settingsincludes\class-authyo-deactivation.php:34
actionadmin_noticesincludes\class-authyo-deactivation.php:37
actionwp_enqueue_scriptsincludes\class-authyo-forminator.php:11
filterforminator_custom_form_submit_errorsincludes\class-authyo-forminator.php:14
filterforminator_fieldsincludes\class-authyo-forminator.php:17
filterforminator_custom_form_submit_field_dataincludes\class-authyo-forminator.php:27
Maintenance & Trust

Authyo OTP for Forminator Form Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version7.4
Downloads292

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Authyo OTP for Forminator Form Developer Profile

Konceptwise Digital Media Pvt Ltd

10 plugins · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Authyo OTP for Forminator Form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Authyo OTP for Forminator Form