Pi AWS Form Submissions Security & Risk Analysis

wordpress.org/plugins/pi-forms-s3-upload

Short Description: Provides a seamless integration between your WordPress site's Forms and Amazon Web Services (AWS) S3 Bucket

0 active installs v1.0.0 PHP 7.2.5+ WP 5.2+ Updated Apr 7, 2024
aws-s3s3s3-file-upload
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Pi AWS Form Submissions Safe to Use in 2026?

Generally Safe

Score 85/100

Pi AWS Form Submissions has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "pi-forms-s3-upload" plugin version 1.0.0 exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The code demonstrates good development practices by utilizing prepared statements for all SQL queries and properly escaping all identified outputs. Crucially, there are no recorded CVEs, suggesting a history of secure development or effective patching. The absence of any taint analysis findings further reinforces this positive outlook, indicating no immediately apparent vulnerabilities related to data handling or path manipulation.

However, a closer examination of the attack surface reveals a potential area for improvement. While the plugin has a relatively small attack surface with only three identified entry points (AJAX handlers and shortcodes), it's noteworthy that only one nonce check is present. The absence of capability checks on all entry points and the presence of AJAX handlers without explicit authentication checks, although currently reported as zero unprotected, could theoretically become a vector if not meticulously managed. The bundled Guzzle library also introduces a dependency that, if not kept updated externally, could pose a future risk.

In conclusion, the plugin demonstrates excellent foundational security practices. The lack of known vulnerabilities and the secure handling of database queries and output are significant strengths. The primary area for cautious consideration lies in the robustness of authentication and authorization across all its entry points, particularly the AJAX handlers, and the management of bundled libraries.

Key Concerns

  • Lack of capability checks on entry points
  • Bundled Guzzle library (potential for outdated)
Vulnerabilities
None known

Pi AWS Form Submissions Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Pi AWS Form Submissions Release Timeline

v1.0.0Current
Code Analysis
Analyzed Apr 16, 2026

Pi AWS Form Submissions Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
19 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Guzzle

Output Escaping

100% escaped19 total outputs
Attack Surface

Pi AWS Form Submissions Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 2

authwp_ajax_pisf3_file_uploadsrc/Client/PIFS3UploadField.php:18
noprivwp_ajax_pisf3_file_uploadsrc/Client/PIFS3UploadField.php:23

Shortcodes 1

[pifs3-uploader] src/Client/PIFS3UploadField.php:14
WordPress Hooks 10
actionadmin_noticespi_forms_s3_uploads.php:47
actionplugins_loadedpi_forms_s3_uploads.php:76
actiongform_field_advanced_settingspi_forms_s3_uploads.php:99
actiongform_editor_jspi_forms_s3_uploads.php:123
filtergform_tooltipspi_forms_s3_uploads.php:136
actiongform_after_submissionsrc/Admin/PIFS3GravityUploadSetting.php:153
actionadmin_menusrc/Admin/PIFS3UploadSetting.php:12
actionadmin_enqueue_scriptssrc/Admin/PIFS3UploadSetting.php:13
actionadmin_initsrc/Admin/PIFS3UploadSetting.php:14
actioninitsrc/Client/PIFS3UploadField.php:16
Maintenance & Trust

Pi AWS Form Submissions Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedApr 7, 2024
PHP min version7.2.5
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Pi AWS Form Submissions Developer Profile

abellowins

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Pi AWS Form Submissions

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pi-forms-s3-uploads/assets/pifs3.css
Version Parameters
pi-forms-s3-uploads/assets/pifs3.css?ver=

HTML / DOM Fingerprints

CSS Classes
s3_settingpifs3-uploads-row
Data Attributes
form_field_s3_value
JS Globals
fieldSettings
FAQ

Frequently Asked Questions about Pi AWS Form Submissions