My Simple Form Security & Risk Analysis

wordpress.org/plugins/my-simple-form

The plugin

10 active installs v1.1 PHP + WP 4.0.0+ Updated Jan 18, 2018
creditdonationsformjobpurchase
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is My Simple Form Safe to Use in 2026?

Generally Safe

Score 85/100

My Simple Form has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "my-simple-form" v1.1 plugin exhibits a concerning security posture despite having no recorded CVEs. While the attack surface appears to be zero in terms of direct entry points like AJAX handlers, REST API routes, and shortcodes, this could be misleading if the plugin's functionality is intended to be triggered through other means not captured by this static analysis. The code signals reveal significant weaknesses, particularly in output escaping and SQL query preparedness. A very low percentage of outputs are properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. Additionally, the majority of SQL queries are not using prepared statements, which exposes the plugin to SQL injection attacks. The taint analysis confirms two high-severity flows with unsanitized paths, strongly suggesting that user-supplied data is not being adequately validated or sanitized before being used in potentially dangerous operations.

The lack of vulnerability history is positive, but it does not negate the critical issues identified in the code analysis. It's possible that the identified flaws haven't been discovered or exploited yet, or that the plugin's limited functionality or typical usage patterns have masked them. The absence of nonce checks and capability checks on any potential entry points is a significant oversight, allowing for potential Cross-Site Request Forgery (CSRF) and privilege escalation if any implicit entry points exist.

In conclusion, "my-simple-form" v1.1, despite a clean CVE record, presents substantial risks due to inadequate output escaping, vulnerable SQL query practices, and high-severity taint flows. The lack of authentication checks on any potential interaction points further compounds these risks. While a zero attack surface is a positive sign, it should be viewed with skepticism given the other serious code-level vulnerabilities.

Key Concerns

  • High severity taint flows found
  • Low percentage of properly escaped output
  • Low percentage of SQL using prepared statements
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

My Simple Form Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

My Simple Form Code Analysis

Dangerous Functions
0
Raw SQL Queries
7
1 prepared
Unescaped Output
167
36 escaped
Nonce Checks
0
Capability Checks
0
File Operations
9
External Requests
0
Bundled Libraries
0

SQL Query Safety

13% prepared8 total queries

Output Escaping

18% escaped203 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
actionIndex (app\controller\admin\Config.php:58)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

My Simple Form Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionplugins_loadedapp\index_init.php:13
actionwp_headapp\index_init.php:276
filterthe_contentapp\index_init.php:283
filterset-screen-optionlibrary\wp-plance\controller.php:17
actionadmin_headlibrary\wp-plance\controller.php:22
actionadmin_noticeslibrary\wp-plance\flash.php:35
actionadmin_menulibrary\wp-plance\interface.php:20
actionplugins_loadedmy-simple-form.php:30
Maintenance & Trust

My Simple Form Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedJan 18, 2018
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

My Simple Form Developer Profile

Pavel

8 plugins · 30 total installs

93
trust score
Avg Security Score
98/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect My Simple Form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/my-simple-form/library/wp-plance/include.php/wp-content/plugins/my-simple-form/library/wp-plance/registry.php/wp-content/plugins/my-simple-form/library/wp-plance/flash.php/wp-content/plugins/my-simple-form/library/plance/validate.php/wp-content/plugins/my-simple-form/library/plance/view.php/wp-content/plugins/my-simple-form/library/plance/request.php/wp-content/plugins/my-simple-form/app/index_init.php/wp-content/plugins/my-simple-form/vendor/kohana/include.php+9 more

HTML / DOM Fingerprints

JS Globals
Plance_RegistryPlance_FlashPlance_ValidatePlance_ViewPlance_RequestPlance_MSF_Admin_INIT+1 more
FAQ

Frequently Asked Questions about My Simple Form