Contact Easy Security & Risk Analysis

wordpress.org/plugins/contact-easy

This is the plugin for contacting the owner of website that the data are stored in the wordpress data base.

10 active installs v1.0.0 PHP + WP 2.9.2+ Updated Apr 12, 2014
contactcontact-uscontact-easyemailemail-us
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Contact Easy Safe to Use in 2026?

Generally Safe

Score 85/100

Contact Easy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The contact-easy plugin v1.0.0 exhibits a strong security posture based on the provided static analysis. There are no identified dangerous functions, file operations, or external HTTP requests. All output is properly escaped, and the absence of critical or high-severity taint flows suggests a lack of common injection vulnerabilities. The plugin also has a clean vulnerability history, with no known CVEs, indicating a good track record for security.

However, the analysis does reveal some areas for potential improvement. The presence of raw SQL queries without prepared statements is a significant concern, as it opens the door to SQL injection vulnerabilities if not handled with extreme care. Furthermore, the complete absence of nonce and capability checks, while not directly tied to an exploitable entry point in this specific version's static analysis, represents a gap in standard WordPress security practices. This could become a vulnerability if future versions introduce new entry points or if the current ones are utilized in ways not captured by this analysis.

Overall, contact-easy v1.0.0 appears to be a relatively secure plugin with a clean history. Its strengths lie in its lack of obvious dangerous code and proper output escaping. The primary weaknesses are the raw SQL query and the lack of standard authentication and authorization checks, which, while not immediately exploitable in this analysis, represent potential risks that should be addressed for a more robust security profile.

Key Concerns

  • Raw SQL query without prepared statements
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Contact Easy Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Contact Easy Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries
Attack Surface

Contact Easy Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[contact_form] plug-main.php:181
[contact_result] plug-main.php:222
WordPress Hooks 1
actionwp_enqueue_scriptsplug-main.php:16
Maintenance & Trust

Contact Easy Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedApr 12, 2014
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings4
Active installs10
Developer Profile

Contact Easy Developer Profile

raju_ahmed

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Contact Easy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/contact-easy/css/style.css

HTML / DOM Fingerprints

CSS Classes
errorsuccess_classoutput_class
Shortcode Output
<table width="50%" ><table width="100%" border="2" bordercolor="#006699">
FAQ

Frequently Asked Questions about Contact Easy