Contact Details Security & Risk Analysis

wordpress.org/plugins/contact

Adds the ability to easily enter and display contact information.

1K active installs v0.8.1 PHP + WP 3.9+ Updated Nov 28, 2017
contactdetailsglobalinfooptions
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Contact Details Safe to Use in 2026?

Generally Safe

Score 85/100

Contact Details has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'contact' plugin version 0.8.1 exhibits a generally strong security posture based on the static analysis. The plugin demonstrates good development practices by avoiding dangerous functions, implementing prepared statements for all SQL queries, and ensuring a high percentage of output is properly escaped. The absence of file operations and external HTTP requests further reduces the attack surface. The presence of a nonce check and a capability check are positive indicators for securing its entry points. Furthermore, the plugin has no recorded vulnerabilities, including critical or high severity CVEs, suggesting a mature and well-maintained codebase.

However, a potential area for improvement lies in the lack of capability checks on its single entry point, the shortcode. While the static analysis indicates this entry point is currently 'unprotected' from an authentication perspective, the absence of explicit capability checks means any user, regardless of their role, could potentially trigger the shortcode's functionality. This could lead to unintended consequences if the shortcode performs actions that should be restricted. Taint analysis revealing zero flows with unsanitized paths is a very positive sign, indicating no obvious vulnerabilities related to data flow were detected. In conclusion, the plugin is robust in its handling of code execution and data sanitation, but the lack of fine-grained access control on its shortcode presents a minor but notable security consideration.

Key Concerns

  • Missing capability checks on shortcode
Vulnerabilities
None known

Contact Details Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Contact Details Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
14 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

88% escaped16 total outputs
Attack Surface

Contact Details Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[contact] index.php:29
WordPress Hooks 5
actioninitindex.php:23
actionadmin_menuindex.php:25
actionadmin_initindex.php:26
filterplugin_row_metaindex.php:27
filtercontact_detailindex.php:30
Maintenance & Trust

Contact Details Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedNov 28, 2017
PHP min version
Downloads113K

Community Trust

Rating100/100
Number of ratings1
Active installs1K
Developer Profile

Contact Details Developer Profile

Steve

4 plugins · 3K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Contact Details

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<form method="post" action=""><input type="hidden" name="" id="_nonce" value="
FAQ

Frequently Asked Questions about Contact Details