constant contact form Security & Risk Analysis

wordpress.org/plugins/constant-contact-form

This constant contact form plugin automatically add your subscribers email address into your constantcontact.com account.

30 active installs v7.4 PHP + WP 3.4+ Updated Jun 12, 2017
constantconstant-contactcontactwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is constant contact form Safe to Use in 2026?

Generally Safe

Score 85/100

constant contact form has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The constant-contact-form plugin v7.4 exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, the use of prepared statements for all SQL queries, and the lack of known vulnerabilities are significant strengths. The plugin also demonstrates awareness of security practices by implementing a nonce check and handling file operations, although the limited number of file operations suggests this may not be a primary function.

However, there are areas for improvement. The most notable concern is the low rate of output escaping (30%), which indicates a potential risk of Cross-Site Scripting (XSS) vulnerabilities. While no critical or high severity taint flows were detected, the insufficient escaping leaves the door open for malicious input to be rendered directly to users. Additionally, the complete absence of capability checks is a weakness, as it suggests that even authenticated users might be able to trigger plugin actions without proper authorization, especially through the identified shortcode.

The plugin's clean vulnerability history with zero recorded CVEs is a positive indicator, suggesting a history of responsible development and maintenance. This, combined with the secure handling of SQL and the limited attack surface, paints a picture of a plugin that is fundamentally built with security in mind, but which has a significant blind spot regarding output sanitization and authorization checks.

Key Concerns

  • Low output escaping rate
  • Missing capability checks
Vulnerabilities
None known

constant contact form Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

constant contact form Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
26
11 escaped
Nonce Checks
1
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

30% escaped37 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
ccf_admin_options (constant-contact-form.php:81)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

constant contact form Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[constant-contact-form] constant-contact-form.php:279
WordPress Hooks 6
actionadmin_menuconstant-contact-form.php:327
actionparse_requestconstant-contact-form.php:431
filterquery_varsconstant-contact-form.php:432
actionplugins_loadedconstant-contact-form.php:434
actioninitconstant-contact-form.php:435
actionplugins_loadedconstant-contact-form.php:437
Maintenance & Trust

constant contact form Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJun 12, 2017
PHP min version
Downloads11K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

constant contact form Developer Profile

gopiplus

52 plugins · 19K total installs

76
trust score
Avg Security Score
83/100
Avg Patch Time
70 days
View full developer profile
Detection Fingerprints

How We Detect constant contact form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
ccf_captionccf_msgccf_textboxccf_textbox_classccf_buttonccf_textbox_button
Data Attributes
onkeypress="if(event.keyCode==13) ccf_submit_form(this.parentNode,'<?php echo home_url(); ?>')"onblur="if(this.value=='') this.value='<?php echo get_option('ccf_with_in_textbox'); ?>';"onfocus="if(this.value=='<?php echo get_option('ccf_with_in_textbox'); ?>') this.value='';"onClick="javascript:ccf_submit_form(this.parentNode,'<?php echo home_url(); ?>');"
JS Globals
ccf_submit_form
Shortcode Output
<div class="ccf_caption"><span id="ccf_msg"></span><input class="ccf_textbox_class" name="ccf_txt_email"<input class="ccf_textbox_button" type="button" name="ccf_txt_Button"
FAQ

Frequently Asked Questions about constant contact form