GDPR Data Request Form Security & Risk Analysis

wordpress.org/plugins/gdpr-data-request-form

Use WordPress Core GDPR tools to build front-end Personal Data export/erasure forms (includes Widget, Gutenberg Block, shortcode & Hooks).

6K active installs v1.7 PHP 5.6+ WP 4.9.6+ Updated Nov 27, 2025
exportgdprpersonal-data-requestprivacy
100
A · Safe
CVEs total1
Unpatched0
Last CVEFeb 2, 2024
Safety Verdict

Is GDPR Data Request Form Safe to Use in 2026?

Generally Safe

Score 100/100

GDPR Data Request Form has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Feb 2, 2024Updated 4mo ago
Risk Assessment

The gdpr-data-request-form plugin v1.7 exhibits a generally strong security posture with several good practices evident in the static analysis. Notably, all SQL queries are prepared statements, and a very high percentage of outputs are properly escaped, significantly reducing the risk of common web vulnerabilities like SQL injection and cross-site scripting. The plugin also lacks dangerous functions, file operations, and external HTTP requests, further minimizing its attack surface. The absence of any unpatched vulnerabilities in its history is also a positive sign.

However, there are a couple of areas that warrant attention. The presence of two 'flows with unsanitized paths' in the taint analysis, while not classified as critical or high severity, suggests a potential for insecure handling of file paths or user-supplied input that could be used to manipulate file access. Additionally, the complete absence of capability checks on its entry points is a significant concern. While AJAX handlers and shortcodes are present, the lack of explicit permission checks means that any authenticated user, regardless of their role, could potentially trigger these functionalities. This could lead to unintended actions or data exposure if the functionality is sensitive.

Overall, the plugin has a solid foundation in secure coding practices, particularly concerning database interactions and output handling. The historical data also indicates a responsible approach to vulnerability management. The main weaknesses lie in the potential for path-related issues identified in the taint analysis and the critical omission of capability checks on its entry points, which represent a notable risk that could be exploited by authenticated but unauthorized users.

Key Concerns

  • Flows with unsanitized paths
  • No capability checks on entry points
Vulnerabilities
1

GDPR Data Request Form Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-24836medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

GDPR Data Request Form <= 1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting

Feb 2, 2024 Patched in 1.7 (4d)
Code Analysis
Analyzed Mar 16, 2026

GDPR Data Request Form Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
66 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

93% escaped71 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
gdrf_enqueue_admin_script (includes\admin-settings.php:24)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

GDPR Data Request Form Attack Surface

Entry Points6
Unprotected0

AJAX Handlers 4

authwp_ajax_gdrf_data_requestdata-request.php:61
noprivwp_ajax_gdrf_data_requestdata-request.php:62
authwp_ajax_gdrf_data_requestincludes\data-request.php:61
noprivwp_ajax_gdrf_data_requestincludes\data-request.php:62

Shortcodes 2

[gdpr-data-request] public\shortcode.php:16
[gpdr-data-request] public\shortcode.php:18
WordPress Hooks 9
filteruser_request_confirmed_email_toincludes\admin-settings.php:19
actionadmin_enqueue_scriptsincludes\admin-settings.php:53
actioninitpublic\block.php:47
actionwp_enqueue_scriptspublic\enqueues.php:14
actionwp_enqueue_scriptspublic\enqueues.php:19
actionwp_enqueue_scriptspublic\public.php:14
actionwp_enqueue_scriptspublic\public.php:19
actioninitpublic\shortcode.php:20
actionwidgets_initpublic\widget.php:23
Maintenance & Trust

GDPR Data Request Form Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedNov 27, 2025
PHP min version5.6
Downloads73K

Community Trust

Rating98/100
Number of ratings14
Active installs6K
Developer Profile

GDPR Data Request Form Developer Profile

Jb Audras

24 plugins · 64K total installs

78
trust score
Avg Security Score
98/100
Avg Patch Time
661 days
View full developer profile
Detection Fingerprints

How We Detect GDPR Data Request Form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gdpr-data-request-form/public/css/public.css/wp-content/plugins/gdpr-data-request-form/public/js/gdrf-public.js/wp-content/plugins/gdpr-data-request-form/includes/js/gdrf-admin.js
Script Paths
js/gdrf-admin.js
Version Parameters
gdpr-data-request-form/public/css/public.css?ver=gdpr-data-request-form/public/js/gdrf-public.js?ver=

HTML / DOM Fingerprints

CSS Classes
gdrf-fieldgdrf-field-actiongdrf-data-type-inputgdrf-data-type-labelgdrf-field-emailgdrf-field-humangdrf-field-submit
Data Attributes
gdrf_data_human_keygdrf_data_noncegdrf_data_typegdrf-data-type-exportgdrf-data-type-removegdrf_data_email+1 more
JS Globals
gdrf_settingsgdrf_localize
REST Endpoints
/wp-json/wp/v2/users
FAQ

Frequently Asked Questions about GDPR Data Request Form