Easy Leads Free Security & Risk Analysis

wordpress.org/plugins/easy-leads-free

Easy Leads Free - collect leads and contacts from your website to the database. Send mails to your leads from the admin panel after.

0 active installs v1.0.0 PHP 5.4+ WP 3.0.1+ Updated Oct 28, 2020
contactsformleadsmailsshortcode
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Easy Leads Free Safe to Use in 2026?

Generally Safe

Score 85/100

Easy Leads Free has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "easy-leads-free" v1.0.0 plugin presents a generally good security posture based on the provided static analysis. The plugin has a small attack surface with no unprotected entry points, a reasonable number of shortcodes, and no exposed AJAX handlers or REST API routes without proper checks. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests are positive indicators. The code signals also show a significant percentage of output being properly escaped, which is crucial for preventing cross-site scripting (XSS) vulnerabilities.

However, a notable concern lies in the handling of SQL queries. All 8 SQL queries are executed without the use of prepared statements. This represents a significant risk of SQL injection vulnerabilities, especially if the data used in these queries originates from user input, which is not explicitly detailed in the taint analysis but is a common vector. The lack of nonce checks is also a weakness, though its impact is mitigated by the absence of unprotected AJAX handlers.

With no known historical vulnerabilities (CVEs) and no critical or high-severity issues identified in the taint analysis, the plugin has a clean track record. This suggests either diligent development practices or a lack of targeting. Nevertheless, the raw SQL queries remain a significant, inherent risk that could be exploited. In conclusion, while the plugin demonstrates strengths in limiting its attack surface and performing output escaping, the prevalent use of un-prepared SQL queries is a substantial security weakness that needs to be addressed.

Key Concerns

  • All SQL queries are not using prepared statements
  • No nonce checks on entry points
Vulnerabilities
None known

Easy Leads Free Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Easy Leads Free Code Analysis

Dangerous Functions
0
Raw SQL Queries
8
0 prepared
Unescaped Output
8
50 escaped
Nonce Checks
0
Capability Checks
6
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared8 total queries

Output Escaping

86% escaped58 total outputs
Attack Surface

Easy Leads Free Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[easyleadsform] 1.0\easyleads.php:116
[easyleadsform] easyleads.php:116
WordPress Hooks 12
actionadmin_post_easy_leads_form1.0\easyleads.php:117
actionadmin_post_nopriv_easy_leads_form1.0\easyleads.php:118
actionadmin_menu1.0\easyleads.php:122
actionadmin_post_el_mail_form1.0\easyleads.php:177
actionadmin_post_el_lead_delete1.0\easyleads.php:192
actionadmin_post_el_lead_send1.0\easyleads.php:242
actionadmin_post_easy_leads_formeasyleads.php:117
actionadmin_post_nopriv_easy_leads_formeasyleads.php:118
actionadmin_menueasyleads.php:122
actionadmin_post_el_mail_formeasyleads.php:177
actionadmin_post_el_lead_deleteeasyleads.php:192
actionadmin_post_el_lead_sendeasyleads.php:242
Maintenance & Trust

Easy Leads Free Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedOct 28, 2020
PHP min version5.4
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Easy Leads Free Developer Profile

butteff

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Easy Leads Free

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<form method="POST" id="easy_leads_form" action="/wp-admin/admin-post.php"><input type="hidden" name="action" value="easy_leads_form"/><input type="text" name="name" placeholder="Name"/><input type="text" name="phone" placeholder="Phone"/>
FAQ

Frequently Asked Questions about Easy Leads Free