Contact Form DB for Enfold Security & Risk Analysis

wordpress.org/plugins/contact-form-db-for-enfold

Save All Contact from Enfold Module Contact in DB

700 active installs v2.0.2 PHP 7.1.16+ WP 4.8+ Updated Nov 21, 2019
enfoldenfold-by-kriesienfold-contact-formenfold-module-contact
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Contact Form DB for Enfold Safe to Use in 2026?

Generally Safe

Score 85/100

Contact Form DB for Enfold has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The static analysis of contact-form-db-for-enfold v2.0.2 reveals a generally positive security posture, with no direct vulnerabilities identified in the attack surface, dangerous functions, file operations, or external HTTP requests. Furthermore, the vulnerability history shows no previously recorded CVEs, indicating a potentially stable and well-maintained codebase.

However, significant concerns arise from the SQL query handling and output escaping. The analysis indicates that 100% of the SQL queries are not using prepared statements, which presents a high risk of SQL injection vulnerabilities. Additionally, none of the identified output points are properly escaped, leaving the plugin susceptible to Cross-Site Scripting (XSS) attacks. The absence of nonce and capability checks across the board, though not directly exploitable due to the lack of entry points in this specific analysis, points to a potential weakness if new AJAX handlers or REST API routes were to be introduced without proper security measures.

In conclusion, while the plugin benefits from a clean vulnerability history and a minimal attack surface in this version, the critical lack of prepared statements for SQL queries and proper output escaping are significant security weaknesses that require immediate attention to mitigate the risk of severe exploitation.

Key Concerns

  • SQL queries without prepared statements
  • Output not properly escaped
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Contact Form DB for Enfold Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Contact Form DB for Enfold Code Analysis

Dangerous Functions
0
Raw SQL Queries
5
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared5 total queries

Output Escaping

0% escaped3 total outputs
Attack Surface

Contact Form DB for Enfold Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedenfold-contact-form.php:15
actionadmin_menuenfold-contact-form.php:55
filteravf_form_sendenfold-contact-form.php:59
Maintenance & Trust

Contact Form DB for Enfold Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedNov 21, 2019
PHP min version7.1.16
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs700
Developer Profile

Contact Form DB for Enfold Developer Profile

doit

3 plugins · 1K total installs

74
trust score
Avg Security Score
71/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Contact Form DB for Enfold

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/contact-form-db-for-enfold/admin/js/ecf_scripts.js/wp-content/plugins/contact-form-db-for-enfold/admin/css/ecf_style.css
Script Paths
/wp-content/plugins/contact-form-db-for-enfold/admin/js/ecf_scripts.js
Version Parameters
contact-form-db-for-enfold/admin/js/ecf_scripts.js?ver=contact-form-db-for-enfold/admin/css/ecf_style.css?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- @deactivated_plugin -->
FAQ

Frequently Asked Questions about Contact Form DB for Enfold