Free Feedback Form Plugin Security & Risk Analysis

wordpress.org/plugins/kampyle-integrator-for-wordpress

Add the Kampyle code required to integrate it to your WordPress site

10 active installs v1.0 PHP + WP 2.7+ Updated Jan 5, 2011
analyticsfeedbackfeedback-formkampyle
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Free Feedback Form Plugin Safe to Use in 2026?

Generally Safe

Score 85/100

Free Feedback Form Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The kampyle-integrator-for-wordpress plugin, version 1.0, exhibits a mixed security posture. On the positive side, it demonstrates an absence of known vulnerabilities and CVEs, suggesting a generally stable history. The code analysis indicates a lack of dangerous functions, file operations, and external HTTP requests, which are common vectors for exploitation. Furthermore, all SQL queries utilize prepared statements, a crucial security practice. However, there are significant concerns regarding output escaping. With 100% of its outputs not properly escaped, the plugin presents a high risk of cross-site scripting (XSS) vulnerabilities. This means that any data displayed to users, if it originates from an untrusted source, could be manipulated to inject malicious scripts, potentially leading to session hijacking, data theft, or defacement.

While the plugin has a clean vulnerability history and appears to have a limited attack surface from the static analysis (0 AJAX handlers, REST API routes, shortcodes, and cron events without protection), the critical flaw in output escaping overshadows these strengths. The presence of a nonce check is a positive sign, but its effectiveness is limited without corresponding authorization checks on critical functionalities, though none were explicitly found in the static analysis that are exposed. The lack of any recorded vulnerabilities historically could indicate either a very mature and secure development process or simply a lack of widespread usage and targeted attacks. Regardless, the unescaped output is a glaring security weakness that must be addressed.

Key Concerns

  • All outputs are unescaped
  • No capability checks on entry points
Vulnerabilities
None known

Free Feedback Form Plugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Free Feedback Form Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Attack Surface

Free Feedback Form Plugin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuplugin.php:31
actionwp_footerplugin.php:37
Maintenance & Trust

Free Feedback Form Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedJan 5, 2011
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Free Feedback Form Plugin Developer Profile

cardanopress

3 plugins · 60 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Free Feedback Form Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
crazyegg
FAQ

Frequently Asked Questions about Free Feedback Form Plugin