Contact Commenter Security & Risk Analysis

wordpress.org/plugins/contact-commenter

This Plugin lets you send email messages to individual or a group of commenters.

10 active installs v0.8 PHP + WP 2.8+ Updated Mar 18, 2011
admincommentcommentsmail%da%a9%d8%a7%d9%88%d8%b4%da%af%d8%b1
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Contact Commenter Safe to Use in 2026?

Generally Safe

Score 85/100

Contact Commenter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "contact-commenter" plugin v0.8 exhibits a concerning security posture due to significant deviations from standard WordPress security practices, despite a clean vulnerability history. The static analysis reveals a complete lack of essential security checks for all identified entry points, which are currently zero. Specifically, the absence of nonce checks, capability checks, and proper output escaping is alarming, as is the presence of raw SQL queries. While the "attack surface" is reported as zero, this is likely due to the absence of specific components like AJAX handlers, REST API routes, or shortcodes, rather than an inherent security. The taint analysis showing flows with unsanitized paths, even without critical or high severity, points to potential vulnerabilities if new entry points were introduced or existing code was modified.

The plugin's vulnerability history is currently clean, which is a positive sign. However, this lack of history does not negate the risks identified in the code analysis. It might indicate that the plugin is not widely used, has not been subjected to thorough security audits, or that the potential vulnerabilities have not yet been exploited or discovered. The absence of proper input validation and output escaping, combined with raw SQL, creates a fertile ground for cross-site scripting (XSS) and SQL injection vulnerabilities should an attacker find a way to leverage these weaknesses. Therefore, while the plugin might appear safe due to its past, the current codebase presents significant risks that require immediate attention.

Key Concerns

  • SQL queries not using prepared statements
  • No output escaping for outputs
  • No nonce checks
  • No capability checks
  • Taint flows with unsanitized paths
Vulnerabilities
None known

Contact Commenter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Contact Commenter Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
12
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped12 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
contact_commenter_options (contact-commenter.php:34)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Contact Commenter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menucontact-commenter.php:14
filteradmin_headcontact-commenter.php:236
actionadmin_footercontact-commenter.php:277
filtercomment_textcontact-commenter.php:278
Maintenance & Trust

Contact Commenter Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedMar 18, 2011
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Contact Commenter Developer Profile

moallemi

6 plugins · 90 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Contact Commenter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
cc-input
FAQ

Frequently Asked Questions about Contact Commenter