
iSMS Contact Form with 2 Factor Authenticator Security & Risk Analysis
wordpress.org/plugins/isms-contact-form-with-2-factor-authenticatoriSMS Contact Form with 2 Factor Authenticator integration and store form's data entries for your WordPress website.
Is iSMS Contact Form with 2 Factor Authenticator Safe to Use in 2026?
Generally Safe
Score 85/100iSMS Contact Form with 2 Factor Authenticator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "isms-contact-form-with-2-factor-authenticator" plugin version 1.1 exhibits several significant security concerns despite a clean vulnerability history. The primary issue lies in its attack surface, with 14 out of 16 entry points lacking any authentication checks. This means that potentially sensitive actions exposed through these AJAX handlers could be triggered by unauthenticated users, presenting a considerable risk. Furthermore, the presence of the "unserialize" function, combined with 3 out of 5 analyzed taint flows having unsanitized paths, points to a high likelihood of remote code execution or other severe vulnerabilities if user-controlled data is passed through these vulnerable functions. While the plugin does utilize prepared statements for a majority of its SQL queries and has a decent output escaping rate, these strengths are overshadowed by the lack of authentication on its AJAX endpoints and the critical taint analysis findings.
The plugin's history of zero known CVEs is a positive sign, suggesting that in the past, it may not have had exploitable public vulnerabilities or they were quickly patched. However, this clean history cannot negate the clear and present dangers identified in the static code analysis. The lack of capability checks and the single nonce check on a large number of AJAX handlers are critical oversights. The combination of an extensive unprotected attack surface and insecure data handling, particularly the unserialize function and unsanitized taint flows, creates a high-risk profile for this plugin. Users should exercise extreme caution and consider disabling or replacing this plugin until these critical security flaws are addressed.
Key Concerns
- Unprotected AJAX handlers
- Critical taint flows with unsanitized paths
- Dangerous function: unserialize
- Missing capability checks
- Limited nonce checks on AJAX
iSMS Contact Form with 2 Factor Authenticator Security Vulnerabilities
iSMS Contact Form with 2 Factor Authenticator Release Timeline
iSMS Contact Form with 2 Factor Authenticator Code Analysis
Dangerous Functions Found
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
iSMS Contact Form with 2 Factor Authenticator Attack Surface
AJAX Handlers 14
Shortcodes 2
WordPress Hooks 9
Maintenance & Trust
iSMS Contact Form with 2 Factor Authenticator Maintenance & Trust
Maintenance Signals
Community Trust
iSMS Contact Form with 2 Factor Authenticator Alternatives
iSMS Contact Form with 2 Factor Authenticator Developer Profile
3 plugins · 10 total installs
How We Detect iSMS Contact Form with 2 Factor Authenticator
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/isms-contact-form-with-2-factor-authenticator/assets/js/custom.js/wp-content/plugins/isms-contact-form-with-2-factor-authenticator/assets/css/custom.css/wp-content/plugins/isms-contact-form-with-2-factor-authenticator/assets/css/style.css/wp-content/plugins/isms-contact-form-with-2-factor-authenticator/assets/js/custom.js/wp-content/plugins/isms-contact-form-with-2-factor-authenticator/assets/js/admin-script.jsisms-contact-form-with-2-factor-authenticator/assets/css/custom.css?ver=isms-contact-form-with-2-factor-authenticator/assets/css/style.css?ver=isms-contact-form-with-2-factor-authenticator/assets/js/custom.js?ver=isms-contact-form-with-2-factor-authenticator/assets/js/admin-script.js?ver=HTML / DOM Fingerprints
isms_authform_container<!-- iSMS Contact Form -->data-formidisms_authform_ajax_object/wp-json/isms_authform/v1/send_email[isms_authform]