Code Sample Contact Form Security & Risk Analysis

wordpress.org/plugins/code-sample-contact-form

This is plugin to create simple contact form.

0 active installs v1.0.0 PHP 5.6+ WP 5.0+ Updated Sep 29, 2023
captchacontactcontact-formemailform
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Code Sample Contact Form Safe to Use in 2026?

Generally Safe

Score 85/100

Code Sample Contact Form has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "code-sample-contact-form" plugin v1.0.0 exhibits a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for SQL queries and having a relatively small attack surface with no known CVEs. The absence of file operations and external HTTP requests is also a strength.

However, several significant concerns are raised by the static analysis. The presence of the `unserialize` function, a known source of vulnerabilities if used with untrusted input, is a major red flag, especially with no evident capability or nonce checks around its usage. The taint analysis revealing flows with unsanitized paths, even if not reaching critical or high severity in this specific analysis, points to potential weaknesses where user-supplied data might not be adequately validated before being processed. The lack of nonce checks and capability checks on the identified shortcode entry point is also concerning, as it opens the door for potential unauthorized actions or information disclosure if the shortcode's functionality is sensitive.

Given the complete absence of historical vulnerability data, it's difficult to draw long-term conclusions. However, the current analysis highlights areas of potential risk that need attention. The plugin's strengths lie in its SQL handling and lack of external dependencies. Its weaknesses are primarily in the handling of potentially dangerous functions like `unserialize` and the lack of robust input validation and access control mechanisms around its entry points.

Key Concerns

  • Dangerous function: unserialize used
  • Taint flow with unsanitized paths
  • No nonce checks
  • No capability checks
  • Output escaping below 100%
Vulnerabilities
None known

Code Sample Contact Form Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Code Sample Contact Form Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Code Sample Contact Form Code Analysis

Dangerous Functions
4
Raw SQL Queries
0
0 prepared
Unescaped Output
32
189 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$data = unserialize(get_option('cs_contact', true));admin\controllers\wp_codesample_contact_controller.php:135
unserialize$content = unserialize($contact->post_content);admin\views\wp_codesample_contact-admin-edit.php:40
unserialize$fields = unserialize($data->post_content);public\controllers\wp_codesample_contact-public-controller.php:89
unserialize$options = unserialize(get_option('cs_contact'));public\controllers\wp_codesample_contact-public-controller.php:94

Output Escaping

86% escaped221 total outputs
Data Flows · Security
4 unsanitized

Data Flow Analysis

10 flows4 with unsanitized paths
load_cs_contact_form (public\controllers\wp_codesample_contact-public-controller.php:63)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Code Sample Contact Form Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[cs-contact] public\controllers\wp_codesample_contact-public-controller.php:55
WordPress Hooks 8
actioninitadmin\controllers\wp_codesample_contact_controller.php:54
actionplugins_loadedincludes\class-wp_codesample_contact.php:152
actionadmin_enqueue_scriptsincludes\class-wp_codesample_contact.php:167
actionadmin_enqueue_scriptsincludes\class-wp_codesample_contact.php:168
actionadmin_menuincludes\class-wp_codesample_contact.php:169
actionwp_enqueue_scriptsincludes\class-wp_codesample_contact.php:184
actionwp_enqueue_scriptsincludes\class-wp_codesample_contact.php:185
actioninitpublic\controllers\wp_codesample_contact-public-controller.php:54
Maintenance & Trust

Code Sample Contact Form Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedSep 29, 2023
PHP min version5.6
Downloads808

Community Trust

Rating80/100
Number of ratings1
Active installs0
Developer Profile

Code Sample Contact Form Developer Profile

Hung Truong

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Code Sample Contact Form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/code-sample-contact-form/assets/css/wp_codesample_contact-admin.css/wp-content/plugins/code-sample-contact-form/assets/js/wp_codesample_contact-admin.js
Script Paths
/wp-content/plugins/code-sample-contact-form/assets/js/wp_codesample_contact-admin.js
Version Parameters
wp_codesample_contact-admin.css?ver=wp_codesample_contact-admin.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- The admin-specific functionality of the plugin. --><!-- This function is provided for demonstration purposes only. --><!-- An instance of this class should be passed to the run() function --><!-- defined in Wp_codesample_contact_Loader as all of the hooks are defined -->+4 more
Data Attributes
data-plugin-name="Wp_codesample_contact"data-plugin-version="1.0.0"
JS Globals
window.Wp_codesample_contact_controller
FAQ

Frequently Asked Questions about Code Sample Contact Form