
Version Reviewed | 2.5 |
Creator | Takayuki Miyoshi |
Plugin Link | https://wordpress.org/plugins/flamingo/ |
Multi-language | Yes |
Paid/Premium Version | No |
ClassicPress Compatible | No |
Nagware/Notifications | No |
Add-on Plugins
Index
The Review
If you haven’t already, you’ll need to head on over to our review about Contact Form 7, the form creator plugin for WordPress sites, before using this plugin. Flamingo is an add-on plugin which requires the Contact Form 7 plugin to function. From the description it seems to be a plugin for keeping form submissions in the WordPress database instead of emailing the submissions.
Flamingo add-on plugin allows website owners to keep a copy of submitted form using the Contact Form 7 plugin while also keeping an address book of all user submissions. You can also bypass the emailing part of Contact Form 7 and just have the answered stored in your database for your website. Great idea if you don’t want the submissions emailed and would rather check the site for submitted forms.
Installation & Activation
Before we installed the plugin, first we added the Contact Form 7 plugin. We then created a new form, tested a few features with Contact Form 7 before going back to the Plugin repository to add the Flamingo add-on plugin. Installing and activation was just like any other plugin found on the repository. There are no nagware notices after installing and activating.
Testing
At the time of this posting, for our testing environment we used the latest version of WordPress, 6.8, on a Linux based server running PHP 8.2, with Nginx, and MySQL. These results may not be the same as yours.
Conclusion
The plugin is straight forward on what it accomplishes, a way to store user submitted forms without the need (optional) for sending emails. Also adding an address book of everyone who has ever submitted a form.
Plugin Resources
A list of 3rd party libraries, API connections, PHP mods, and/or WordPress hooks that are used/required.
- Contact Form 7
Vulnerabilities
There are currently no known vulnerabilities being exploited.