Flamingo Security & Risk Analysis

wordpress.org/plugins/flamingo

A trustworthy message storage plugin for Contact Form 7.

800K active installs v2.6.1 PHP 7.4+ WP 6.7+ Updated Dec 1, 2025
birdcontactcrmmail
100
A · Safe
CVEs total1
Unpatched0
Last CVEJan 15, 2020
Safety Verdict

Is Flamingo Safe to Use in 2026?

Generally Safe

Score 100/100

Flamingo has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jan 15, 2020Updated 4mo ago
Risk Assessment

Flamingo v2.6.1 demonstrates a generally good security posture, with strong adherence to best practices such as prepared statements for all SQL queries and robust output escaping (94%). The plugin also implements a healthy number of nonce and capability checks, indicating an awareness of common WordPress security vulnerabilities. The static analysis shows no immediate critical risks related to dangerous functions, file operations, or external HTTP requests. The total attack surface is also minimal, with no exposed AJAX handlers, REST API routes, or shortcodes that are unprotected.

However, there are a couple of areas that warrant attention. The taint analysis revealed two flows with unsanitized paths, which, while not classified as critical or high severity in this analysis, could potentially be exploited under certain conditions if user input is involved. Furthermore, the plugin has a history of a medium severity vulnerability related to Command Injection, even though it is currently patched. This historical pattern suggests that developers should remain vigilant about input sanitization, particularly for any functionality that might interact with system commands or sensitive paths.

In conclusion, Flamingo v2.6.1 is a relatively secure plugin, backed by good coding practices. The primary concerns stem from the presence of unsanitized paths in the taint analysis and the historical vulnerability type. While no current critical vulnerabilities are evident, proactive monitoring and potentially further code review around the identified taint flows would be beneficial for maintaining a robust security profile.

Key Concerns

  • Flows with unsanitized paths identified
  • Historical Command Injection vulnerability
Vulnerabilities
1

Flamingo Security Vulnerabilities

CVEs by Year

1 CVE in 2020
2020
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

WF-78760d4d-04fc-4a6c-8c0d-6bf897335651-flamingomedium · 6.4Improper Neutralization of Special Elements used in a Command ('Command Injection')

Flamingo <= 2.1 - CSV Injection

Jan 15, 2020 Patched in 2.1.1 (1469d)
Code Analysis
Analyzed Mar 16, 2026

Flamingo Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
10
161 escaped
Nonce Checks
17
Capability Checks
21
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

94% escaped171 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
flamingo_contact_admin_page (admin\admin.php:309)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Flamingo Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 17
actionadmin_menuadmin\admin.php:6
filterset_screen_option_flamingo_contacts_per_pageadmin\admin.php:50
filterset_screen_option_flamingo_inbound_messages_per_pageadmin\admin.php:54
actionadmin_enqueue_scriptsadmin\admin.php:71
actionflamingo_admin_updated_messageadmin\admin.php:121
filterwp_privacy_personal_data_erasersadmin\includes\privacy.php:9
actioninitflamingo.php:57
filterwp_untrash_post_statusflamingo.php:62
filtermap_meta_capincludes\capabilities.php:3
actionwp_insert_commentincludes\comment.php:6
actiontransition_comment_statusincludes\comment.php:26
actionadmin_initincludes\cron.php:9
actionflamingo_hourly_cron_jobincludes\cron.php:23
filterflamingo_csv_quotationincludes\csv.php:202
filterflamingo_csv_field_prefixincludes\csv.php:215
actionprofile_updateincludes\user.php:7
actionuser_registerincludes\user.php:8

Scheduled Events 1

flamingo_hourly_cron_job
Maintenance & Trust

Flamingo Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 1, 2025
PHP min version7.4
Downloads8.1M

Community Trust

Rating84/100
Number of ratings118
Active installs800K
Developer Profile

Flamingo Developer Profile

Rock Lobster Inc.

6 plugins · 11.1M total installs

75
trust score
Avg Security Score
94/100
Avg Patch Time
1303 days
View full developer profile
Detection Fingerprints

How We Detect Flamingo

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/flamingo/admin/includes/css/style.css/wp-content/plugins/flamingo/admin/includes/css/style-rtl.css/wp-content/plugins/flamingo/admin/includes/js/index.js
Script Paths
/wp-content/plugins/flamingo/admin/includes/js/index.js
Version Parameters
flamingo/admin/includes/css/style.css?ver=flamingo/admin/includes/css/style-rtl.css?ver=flamingo/admin/includes/js/index.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-iddata-group
JS Globals
flamingo
REST Endpoints
/wp-json/flamingo/v1/contacts/wp-json/flamingo/v1/inbound-messages
FAQ

Frequently Asked Questions about Flamingo