Simpul Forms by Esotech Security & Risk Analysis

wordpress.org/plugins/simpul-forms-by-esotech

Under "Settings" enables "Forms" panel to customize forms to use with a shortcode. Enables "Email" panel to config SMTP …

10 active installs v1.03 PHP + WP 3.3.2+ Updated Oct 15, 2012
emailformsmailsmtp
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simpul Forms by Esotech Safe to Use in 2026?

Generally Safe

Score 85/100

Simpul Forms by Esotech has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "simpul-forms-by-esotech" plugin version 1.03 presents a mixed security posture. On the positive side, it demonstrates good practices regarding database interactions, with all SQL queries utilizing prepared statements and no known vulnerabilities (CVEs) recorded. The absence of external HTTP requests and file operations also reduces its attack surface. However, significant concerns arise from the code analysis, particularly the complete lack of output escaping. With 14 total outputs and 0% properly escaped, this indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts through user-controlled input that is then rendered on the page. Additionally, the absence of nonce checks and capability checks, while not directly leading to a deduction based on the provided data (as there are no AJAX handlers or REST API routes without permission callbacks), highlights a potential for future vulnerabilities if such entry points are introduced without proper security measures. The taint analysis showing flows with unsanitized paths is concerning, even without critical or high severity, as it suggests input is not being properly validated or cleaned before use, potentially contributing to XSS or other injection issues.

Key Concerns

  • No output escaping
  • Unsanitized paths in taint flows
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Simpul Forms by Esotech Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Simpul Forms by Esotech Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped14 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
saveFields (simpulforms.php:307)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Simpul Forms by Esotech Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[simpul_forms] simpulforms.php:22
WordPress Hooks 9
actionphpmailer_initincludes\wp_mail_smtp.php:437
filterwhitelist_optionsincludes\wp_mail_smtp.php:441
actionadmin_menuincludes\wp_mail_smtp.php:443
filterplugin_action_linksincludes\wp_mail_smtp.php:447
filterwp_mail_fromincludes\wp_mail_smtp.php:451
filterwp_mail_from_nameincludes\wp_mail_smtp.php:452
actioninitsimpulforms.php:20
actionadmin_print_scriptssimpulforms.php:180
actionadmin_menusimpulforms.php:182
Maintenance & Trust

Simpul Forms by Esotech Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedOct 15, 2012
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Simpul Forms by Esotech Developer Profile

geilt

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simpul Forms by Esotech

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
wpms_options
FAQ

Frequently Asked Questions about Simpul Forms by Esotech