OweBest Contact Form Security & Risk Analysis

wordpress.org/plugins/ob-contact-form

OweBest Contact form is a simple contact form which works out of the box. Use shortcode on posts or pages to generate OweBest Contact Form.

10 active installs v1.0 PHP + WP 3.0.1+ Updated Unknown
contact-formcontact-us-formemail-contact-formowebest-contact-formsimple-contact-form
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is OweBest Contact Form Safe to Use in 2026?

Generally Safe

Score 100/100

OweBest Contact Form has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The plugin "ob-contact-form" v1.0 exhibits a mixed security posture. On the positive side, it has no known vulnerabilities (CVEs) and utilizes prepared statements for all its SQL queries, which is a significant strength. The absence of dangerous functions, file operations, and external HTTP requests also contributes to a generally safer codebase. However, there are notable concerns that detract from its overall security. The presence of two AJAX handlers without authentication checks creates a considerable attack surface, as these can be triggered by unauthenticated users. Furthermore, the code analysis indicates that only 52% of output is properly escaped, suggesting a potential for cross-site scripting (XSS) vulnerabilities in the remaining unescaped outputs. The taint analysis revealed one flow with an unsanitized path, which, while not categorized as critical or high, still represents a potential entry point for malicious input. The single nonce check and zero capability checks on entry points further highlight areas where security mechanisms are lacking.

Key Concerns

  • AJAX handlers without auth checks
  • Low output escaping percentage
  • Unsanitized path in taint flow
  • Zero capability checks on entry points
Vulnerabilities
None known

OweBest Contact Form Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

OweBest Contact Form Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
12 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

52% escaped23 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
obcf_shortcode (contact-form-example.php:113)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

OweBest Contact Form Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

authwp_ajax_obfc_formcontact-form-example.php:21
noprivwp_ajax_obfc_formcontact-form-example.php:22

Shortcodes 1

[obcf_contact_form] contact-form-example.php:112
WordPress Hooks 2
actionwp_enqueue_scriptscontact-form-example.php:13
actionadmin_menucontact-form-example.php:297
Maintenance & Trust

OweBest Contact Form Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

OweBest Contact Form Developer Profile

owebest

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect OweBest Contact Form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ob-contact-form/style.css
Version Parameters
ob-contact-form/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
obcf_first_name_inputobcf_last_name_inputobcf_tel_inputobcf_email_inputobcf_submit_input
Data Attributes
name="obcf_name"id="obcf_name"name="obcf_lastname"id="obcf_lastname"name="obcf_phone"id="obcf_phone"+13 more
JS Globals
ob_squeeze_formajaxurlsuccess_messageerror_message
Shortcode Output
[obcf_contact_form]
FAQ

Frequently Asked Questions about OweBest Contact Form