PCF Contact Form Security & Risk Analysis

wordpress.org/plugins/pcf-contact-form

License GPLv2 or later License URI: http://www.gnu.org/licenses/gpl-2.0.html A simple plugin by PC Futures that creates a contact form that can save …

10 active installs v1.2.1 PHP + WP 4.0+ Updated Oct 27, 2015
contactdatadatabaseformpcf
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is PCF Contact Form Safe to Use in 2026?

Generally Safe

Score 85/100

PCF Contact Form has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The PCF Contact Form plugin version 1.2.1 exhibits a mixed security posture. On the positive side, it has no recorded vulnerabilities (CVEs), no bundled libraries, no file operations, and no external HTTP requests, which are all good security indicators. Furthermore, all SQL queries utilize prepared statements, and there are no identified dangerous functions. However, the static analysis reveals concerning aspects. A significant portion of output (78%) is not properly escaped, posing a risk of Cross-Site Scripting (XSS) attacks, particularly given the presence of a shortcode which can be an entry point for user-supplied data. The taint analysis indicates two flows with unsanitized paths, though they are not flagged as critical or high severity. The complete absence of nonce checks and capability checks across all entry points, including the shortcode, is a major weakness, leaving the plugin vulnerable to various forms of injection and unauthorized actions if an attacker can control the input to the shortcode.

Key Concerns

  • Significant unescaped output (78%)
  • Missing nonce checks on entry points
  • Missing capability checks on entry points
  • Two flows with unsanitized paths
Vulnerabilities
None known

PCF Contact Form Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

PCF Contact Form Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
28
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

22% escaped36 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
html_form_code (core\form.php:7)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

PCF Contact Form Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[pcf_contact_form] core\form.php:87
WordPress Hooks 5
actionwp_enqueue_scriptscontact-form.php:45
actionadmin_initcore\new-options.php:3
actionadmin_menucore\new-options.php:24
actionadmin_initcore\pcfcf-options.php:3
actionadmin_menucore\pcfcf-options.php:4
Maintenance & Trust

PCF Contact Form Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedOct 27, 2015
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

PCF Contact Form Developer Profile

PC Futures

5 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PCF Contact Form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pcf-contact-form/css/pcfcf-style.css

HTML / DOM Fingerprints

CSS Classes
pcfcfpcfcf-inputpcfcf-tarequired
Data Attributes
patterntitle
Shortcode Output
<form action="" method="post" class="pcfcf"><p class="required">Your Name</p><input type="text" name="cf-name"
FAQ

Frequently Asked Questions about PCF Contact Form