VS Contact Form Security & Risk Analysis

wordpress.org/plugins/very-simple-contact-form

With this lightweight plugin you can create a contact form.

7K active installs v19.0 PHP 7.4+ WP 6.0+ Updated Apr 4, 2026
classicpresscontactcontact-formemailform
98
A · Safe
CVEs total4
Unpatched0
Last CVEMar 29, 2024
Download
Safety Verdict

Is VS Contact Form Safe to Use in 2026?

Generally Safe

Score 98/100

VS Contact Form has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

4 known CVEsLast CVE: Mar 29, 2024Updated 1mo ago
Risk Assessment

The "very-simple-contact-form" plugin v18.9 presents a mixed security posture. On the positive side, the static analysis indicates a relatively small attack surface with no directly unprotected AJAX handlers or REST API routes. The vast majority of output is properly escaped, and there are no reported file operations, external HTTP requests, or dangerous function usages. Furthermore, the presence of nonce and capability checks, albeit limited in scope, is a good practice.

However, significant concerns arise from the vulnerability history. The plugin has a history of 4 known CVEs, including one high-severity vulnerability and three medium-severity ones, with the most recent occurring in March 2024. The common vulnerability types (Missing Authorization, Cross-site Scripting, Guessable CAPTCHA) suggest recurring issues in how user input is handled and access is controlled. The fact that a high-severity vulnerability was present as recently as March 2024, even if currently patched, indicates a potential for ongoing security weaknesses that require careful monitoring and prompt patching.

While the current static analysis shows no unpatched vulnerabilities, the plugin's past suggests a higher than average risk of future discoveries. The absence of taint analysis results could mean either no problematic flows were found or the analysis was not comprehensive enough to detect them. The static analysis also reveals that 100% of SQL queries are not using prepared statements, which is a significant risk for potential SQL injection vulnerabilities, despite the low number of queries. Coupled with the lack of capability checks on any entry points, this plugin, despite its small attack surface, carries notable risks due to its past vulnerability profile and insecure SQL handling.

Key Concerns

  • 100% of SQL queries use raw SQL
  • History of 1 high severity vulnerability
  • History of 3 medium severity vulnerabilities
  • No capability checks on entry points
Vulnerabilities
4 published

VS Contact Form Security Vulnerabilities

CVEs by Year

2 CVEs in 2022
2022
1 CVE in 2023
2023
1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

High
1
Medium
3

4 total CVEs

CVE-2024-30540medium · 5.3Guessable CAPTCHA

VS Contact Form <= 14.7 - CAPTCHA Bypass

Mar 29, 2024 Patched in 14.8 (6d)
CVE-2023-41862medium · 5.3Missing Authorization

VS Contact Form <= 13.9 - Missing Authorization

Sep 5, 2023 Patched in 14.0 (140d)
WF-ef7d7378-fa94-4964-916b-a41f69866d76-very-simple-contact-formmedium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

VS Contact Form <= 11.5 - Reflected Cross-Site Scripting

May 25, 2022 Patched in 11.6 (608d)
CVE-2022-1801high · 7.2Guessable CAPTCHA

Very Simple Contact Form <= 11.5 - Captcha Bypass

May 22, 2022 Patched in 11.6 (611d)
Version History

VS Contact Form Release Timeline

v19.0Current
v18.9
v18.8
v18.7
v18.6
v18.5
v18.4
v18.3
v18.2
v18.1
v18.0
v17.9
v17.8
v17.7
v17.6
v17.5
v17.4
v17.3
v17.2
v17.1
Code Analysis
Analyzed Mar 16, 2026

VS Contact Form Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
3
216 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries

Output Escaping

99% escaped219 total outputs
Attack Surface

VS Contact Form Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[contact] vscf-shortcodes.php:69
[contact-widget] vscf-shortcodes.php:133
WordPress Hooks 13
actioninitblock\vscf-block.php:16
actionenqueue_block_assetsblock\vscf-block.php:25
actionadmin_menuvscf-options.php:11
actionadmin_initvscf-options.php:157
actionwp_enqueue_scriptsvscf.php:25
actionwidgets_initvscf.php:31
actioninitvscf.php:52
filtermanage_submission_posts_columnsvscf.php:64
actionmanage_submission_posts_custom_columnvscf.php:76
filtermanage_edit-submission_sortable_columnsvscf.php:84
filterrequestvscf.php:97
filterrequestvscf.php:110
actioninitvscf.php:154
Maintenance & Trust

VS Contact Form Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedApr 4, 2026
PHP min version7.4
Downloads707K

Community Trust

Rating96/100
Number of ratings50
Active installs7K
Developer Profile

VS Contact Form Developer Profile

Guido

20 plugins · 24K total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
341 days
View full developer profile
Detection Fingerprints

How We Detect VS Contact Form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/very-simple-contact-form/css/vscf-style.min.css/wp-content/plugins/very-simple-contact-form/js/vscf-scripts.js/wp-content/plugins/very-simple-contact-form/css/vscf-block-style.min.css
Script Paths
/wp-content/plugins/very-simple-contact-form/js/vscf-scripts.js
Version Parameters
vscf-style.min.css?ver=vscf-scripts.js?ver=vscf-block-style.min.css?ver=

HTML / DOM Fingerprints

Data Attributes
vscf-setting-2
JS Globals
vscf_session_namevscf_ip_addressvscf_page_urlvscf_sessionvscf_delete_sessionvscf_from_header+5 more
REST Endpoints
/wp-json/wp/v2/submission
Shortcode Output
[contact
FAQ

Frequently Asked Questions about VS Contact Form