General Contact Form Security & Risk Analysis

wordpress.org/plugins/general-contact-form

Genaral Contact From plugin allows a wordpress admin to easily create and add contact forms to WordPress. The General Contact Form will let the user s …

10 active installs v1.7 PHP + WP 3.0.1+ Updated Jan 17, 2013
akismetcaptchacontactformgeneral-contact-form
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is General Contact Form Safe to Use in 2026?

Generally Safe

Score 85/100

General Contact Form has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The general-contact-form plugin v1.7 presents a mixed security posture. On the positive side, it has a very small attack surface with only one entry point (a shortcode) and no known vulnerabilities in its history. Furthermore, it doesn't appear to have external dependencies or perform file operations, which are common vectors for exploitation.

However, the static analysis reveals significant concerns. A high percentage of its SQL queries (64%) are not using prepared statements, indicating a potential for SQL injection vulnerabilities. More critically, a substantial number of taint analysis flows (6 out of 9) are flagged as high severity with unsanitized paths, strongly suggesting that user-supplied data is not being properly validated or sanitized before being used in sensitive operations. Additionally, a concerning 0% of output is properly escaped, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The absence of nonce and capability checks, while not directly indicating an exploit on AJAX or REST APIs (as there are none), means that if such features were added in the future without proper checks, the plugin would be immediately vulnerable.

Given the lack of historical CVEs, it's possible these issues haven't been exploited yet or are mitigated by the plugin's limited functionality. However, the static analysis findings, particularly the unsanitized taint flows and lack of output escaping, point to significant inherent security weaknesses that could be exploited. The lack of prepared statements in SQL queries further exacerbates these risks. The plugin's strengths lie in its minimal attack surface and clean vulnerability history, but these are overshadowed by the critical coding practices observed in the static analysis.

Key Concerns

  • High severity taint flows with unsanitized paths
  • No output escaping
  • SQL queries not using prepared statements
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

General Contact Form Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

General Contact Form Code Analysis

Dangerous Functions
0
Raw SQL Queries
18
10 prepared
Unescaped Output
76
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

36% prepared28 total queries

Output Escaping

0% escaped76 total outputs
Data Flows
9 unsanitized

Data Flow Analysis

9 flows9 with unsanitized paths
CF_admin (index.php:195)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

General Contact Form Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[Contact] index.php:120
WordPress Hooks 3
actionadmin_menuindex.php:316
actioninitindex.php:327
actionplugins_loadedindex.php:329
Maintenance & Trust

General Contact Form Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedJan 17, 2013
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

General Contact Form Developer Profile

v_wordpress

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect General Contact Form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/general-contact-form/captcha.php

HTML / DOM Fingerprints

CSS Classes
CF_titlecontact-label
HTML Comments
<!-- Wordpress plugin form tag for displaying and submitting the contact form filled at front end --><!-- Form 'Submit' button; applied javascript onclick attribute --><!-- conatct_admin() includes the contact_admin.php page, which is the admin panel for the contact form plugin --><!-- Contact Form table creation for storing details of the contact form user -->+4 more
Data Attributes
name="CF"id="CF"name="CF_submit"id="CF_submit"id="CF_alertmessage"id="<?php echo $result->fieldid;?>"+3 more
Shortcode Output
<h1>Contact Us</h1><img src="/wp-content/plugins/general-contact-form/captcha.php" alt="captcha image">
FAQ

Frequently Asked Questions about General Contact Form