Simple Contactology Signup Security & Risk Analysis

wordpress.org/plugins/simple-contactology-signup

Easily add a signup form for any of your Contactology Newsletter lists anywhere on your WordPress site.

10 active installs v1.0 PHP + WP 3.3+ Updated Apr 10, 2013
contactologyemail-marketingemailsmailinglistnewsletter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Simple Contactology Signup Safe to Use in 2026?

Generally Safe

Score 85/100

Simple Contactology Signup has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The simple-contactology-signup plugin v1.0 presents a mixed security posture. On one hand, it boasts no known vulnerabilities (CVEs) and handles all its SQL queries using prepared statements, which are excellent security practices. The absence of file operations and external HTTP requests also contributes positively to its security profile. However, significant concerns arise from the static analysis. The presence of a dangerous `create_function` call is a red flag, as it can lead to arbitrary code execution if not handled with extreme care. Furthermore, a substantial 75% of its output is not properly escaped, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis also reveals that all analyzed flows have unsanitized paths, which, while not categorized as critical or high severity in this specific analysis, indicates a general lack of sanitization which could be exploited in conjunction with other weaknesses. The complete absence of nonce and capability checks, especially given the single shortcode entry point, leaves it susceptible to unauthorized actions or manipulation.

Despite the lack of historical vulnerabilities, the current code analysis reveals several potential weaknesses that could be exploited. The most pressing issues are the unescaped output and the use of `create_function`, which, combined with the unsanitized taint flows, indicate a developer who may not be fully aware of common web security best practices. While the plugin has a small attack surface, the identified code quality issues mean that even this small surface could be a vector for attacks like XSS. Therefore, while the plugin has not been historically exploited, the current code analysis suggests a need for immediate code review and remediation to prevent future security incidents.

Key Concerns

  • Dangerous function detected (create_function)
  • High percentage of unescaped output (75%)
  • All taint flows have unsanitized paths
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Simple Contactology Signup Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Simple Contactology Signup Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
21
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function( '', 'return register_widget("scs_widget_wrapper");' ) )includes\widgets.php:69

Output Escaping

25% escaped28 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
scs_check_for_email_signup (includes\functions.php:29)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Simple Contactology Signup Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[contactology] includes\signup-form.php:80
WordPress Hooks 5
actioninitcontactology-signup.php:28
actioninitincludes\functions.php:61
actionadmin_initincludes\settings.php:8
actionadmin_menuincludes\settings.php:14
actionwidgets_initincludes\widgets.php:69
Maintenance & Trust

Simple Contactology Signup Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedApr 10, 2013
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Simple Contactology Signup Developer Profile

Pippin Williamson

19 plugins · 920 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Contactology Signup

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
scs_form
Data Attributes
id="scs_form"name="scs_fname"id="scs_fname"name="scs_lname"id="scs_lname"name="scs_email"+5 more
Shortcode Output
<form id="scs_form" action="" method="post"><input type="hidden" name="redirect"<input type="hidden" name="action" value="scs_signup"<input type="hidden" name="scs_list_id"
FAQ

Frequently Asked Questions about Simple Contactology Signup