DigitSix Simple Contact Form Security & Risk Analysis

wordpress.org/plugins/digitsix-simple-contact-form

DigitSix Simple Contact Form is a simple solution for those who need simple contact forms for their website.

30 active installs v1.0.3 PHP + WP 3.0.1+ Updated Jan 29, 2016
contact-formcontact-form-buildercontact-form-plugincontact-formsform-builder
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is DigitSix Simple Contact Form Safe to Use in 2026?

Generally Safe

Score 85/100

DigitSix Simple Contact Form has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The Digitsix Simple Contact Form plugin, version 1.0.3, exhibits a generally strong security posture based on the static analysis and vulnerability history provided. The plugin demonstrates good practices by utilizing prepared statements for all SQL queries and ensuring all output is properly escaped, which are crucial for preventing common web vulnerabilities. The absence of dangerous functions, file operations, external HTTP requests, and known vulnerabilities in its history further reinforces this positive assessment. However, a significant concern arises from the lack of nonce checks and capability checks across all entry points, including the single shortcode. While the attack surface is currently small and no direct unprotected entry points are identified, this absence leaves the plugin susceptible to cross-site request forgery (CSRF) attacks if the shortcode or any future additions are user-facing and handle sensitive actions or data. The taint analysis, showing unsanitized paths, further highlights this risk, as these flows might be exploitable if they interact with user-controlled data in a vulnerable manner without proper validation or authorization. In conclusion, the plugin has strong foundations in preventing common injection and XSS vulnerabilities, but the oversight in authorization and anti-CSRF mechanisms presents a notable weakness that requires attention.

Key Concerns

  • Missing nonce checks on shortcode
  • Missing capability checks on shortcode
  • Taint flows with unsanitized paths (potential risk)
Vulnerabilities
None known

DigitSix Simple Contact Form Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

DigitSix Simple Contact Form Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped9 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
html_form_code (DigitSix-Simple-Contact-Form.php:11)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

DigitSix Simple Contact Form Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[simple_contact_form] DigitSix-Simple-Contact-Form.php:68
Maintenance & Trust

DigitSix Simple Contact Form Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedJan 29, 2016
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs30
Developer Profile

DigitSix Simple Contact Form Developer Profile

Amit Kumar

1 plugin · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect DigitSix Simple Contact Form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="cf-name"name="cf-email"name="cf-subject"name="cf-message"name="cf-submitted"
Shortcode Output
<formactionmethod="post"name="cf-name"
FAQ

Frequently Asked Questions about DigitSix Simple Contact Form