modeloform Security & Risk Analysis

wordpress.org/plugins/modeloform

Este plugin construye un formulario de correo electrónico con los campos habituales, listo para usar. Dirige los mensajes al mail de administración de …

300 active installs v1.0 PHP 5.2.4+ WP 4.6+ Updated Jun 22, 2021
contact-formemail-formformulario-de-contactoformulario-de-correo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is modeloform Safe to Use in 2026?

Generally Safe

Score 85/100

modeloform has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "modeloform" v1.0 plugin exhibits a generally strong security posture based on the provided static analysis data. It demonstrates excellent practices by utilizing prepared statements for all SQL queries and ensuring all output is properly escaped, which significantly reduces the risk of SQL injection and cross-site scripting (XSS) vulnerabilities. The absence of file operations and external HTTP requests further limits potential attack vectors. Furthermore, the plugin has no recorded vulnerability history, suggesting a history of secure development or diligent patching.

However, there are a few areas that warrant attention. The presence of two taint flows with unsanitized paths, despite not being classified as critical or high severity, indicates a potential for vulnerabilities if user-supplied data is not handled with extreme caution within these flows. The lack of any observed nonce checks or capability checks, particularly given the presence of a shortcode which can serve as an entry point, is a notable concern. While the attack surface is currently small and appears to have no direct unprotected entry points, the absence of these fundamental WordPress security mechanisms means that if any new entry points are introduced or if the existing shortcode gains new functionality that handles user input, it could become vulnerable to various attacks like CSRF if not properly secured. The plugin's strengths lie in its robust data handling for SQL and output, but its weaknesses stem from potential unsanitized data flows and a lack of built-in authorization checks on its entry points.

In conclusion, "modeloform" v1.0 has a good foundation of security practices, particularly in its handling of database queries and output. The absence of historical vulnerabilities is a positive sign. However, the identified taint flows and the absence of nonce and capability checks on its shortcode represent areas where future security risks could arise. The current risk is mitigated by the limited attack surface and lack of direct unprotected entry points, but developers should address the taint flows and implement appropriate authorization checks to further harden the plugin.

Key Concerns

  • Taint flows with unsanitized paths
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

modeloform Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

modeloform Release Timeline

v1.0Current
Code Analysis
Analyzed Mar 16, 2026

modeloform Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped8 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
modelo_form (modeloform.php:18)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

modeloform Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[modeloform] modeloform.php:85
Maintenance & Trust

modeloform Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedJun 22, 2021
PHP min version5.2.4
Downloads28K

Community Trust

Rating80/100
Number of ratings2
Active installs300
Developer Profile

modeloform Developer Profile

Alvaro Artagaveytia

1 plugin · 300 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect modeloform

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="mod-nombre"name="mod-email"name="mod-asunto"name="mod-mensaje"name="mod-enviar"
Shortcode Output
<form action="" method="post"><br/>Por favor complete todos los campos<br/><br/>Su nombre<br/><input type="text" name="mod-nombre"
FAQ

Frequently Asked Questions about modeloform