
Visitor Contact Forms Security & Risk Analysis
wordpress.org/plugins/visitorcontactCreate customizable contact forms and sticky contact button for your WordPress blog. Web 2.0 style.
Is Visitor Contact Forms Safe to Use in 2026?
Generally Safe
Score 85/100Visitor Contact Forms has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "visitorcontact" v1.0 plugin exhibits a seemingly robust security posture based on the static analysis, with no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in zero total entry points. The absence of dangerous functions, raw SQL queries, file operations, external HTTP requests, nonce checks, and capability checks is also commendable. The plugin utilizes prepared statements for all SQL queries. However, a significant concern arises from the output escaping analysis, which indicates that 100% of the identified outputs are not properly escaped.
The taint analysis reveals two flows with unsanitized paths, although they are not classified as critical or high severity. This, combined with the complete lack of output escaping, suggests a potential for cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled correctly before being displayed. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive indicator of past security awareness. However, the absence of past vulnerabilities combined with the identified output escaping issues could imply that these types of vulnerabilities might not have been thoroughly tested for or discovered previously.
In conclusion, while the plugin demonstrates strengths in its limited attack surface and secure database interactions, the critical deficiency in output escaping presents a tangible risk. The taint flows, though not severe, coupled with the unescaped outputs, warrant attention. The clean vulnerability history is a positive, but it should not overshadow the present code-level concerns. A balanced assessment suggests that the plugin is currently at moderate risk due to the high likelihood of XSS vulnerabilities.
Key Concerns
- 0% output escaping
- 2 flows with unsanitized paths
- 0 nonce checks
- 0 capability checks
Visitor Contact Forms Security Vulnerabilities
Visitor Contact Forms Code Analysis
Output Escaping
Data Flow Analysis
Visitor Contact Forms Attack Surface
WordPress Hooks 2
Maintenance & Trust
Visitor Contact Forms Maintenance & Trust
Maintenance Signals
Community Trust
Visitor Contact Forms Alternatives
Contact Form by BestWebSoft – Advanced WP Contact Form Builder for WordPress
contact-form-plugin
The most powerful and user-friendly WordPress contact form plugin. Create beautiful contact forms, widgets and pages using shortcodes.
Contact Form Widget
new-contact-form-widget
Create contact forms with query table management. Simple setup, secure submissions, and easy customization for your site.
Creative Mail – Easier WordPress & WooCommerce Email Marketing
creative-mail-by-constant-contact
Creative Mail was designed specifically for WordPress and WooCommerce. Our intelligent (and super fun) email editor simplifies email marketing campaig …
Gravity PDF
gravity-forms-pdf-extended
Automatically generate, email and download PDF documents from Gravity Forms entries
HTML Forms – Simple WordPress Forms Plugin
html-forms
A simpler, faster, and smarter WordPress forms plugin.
Visitor Contact Forms Developer Profile
3 plugins · 1K total installs
How We Detect Visitor Contact Forms
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/visitorcontact/css/visitor-contact.csshttp://visitorcontact.com/scripts/HTML / DOM Fingerprints
greenBoxredBoxvisitor_contact_form_idvisitor_contact_sticky_buttonvisitor_contact_publish_page<iframe src="http://visitorcontact.com/embed/" frameborder="0" scrolling="no" allowtransparency="true" style="height: 340px; width: 320px;"></iframe>