Hi.
I'm not aware of any other issue that might prevent the correct spidering of DVWA (I'm using version 1.0.7).
I've tested with the (ZAP) version 2.0.0, after removing the fragments from the form's action on the pages "sqli" and "sqli_blind", the spider was able to submit the forms (and the active scan to attack those forms).
Following the steps that I've made (after removing the fragments):
1. Run ZAP (and ensure that the spider option "Process forms [...]" is enabled);
2. Disable the cookies in the client application (browser), the cookies will be managed by ZAP;
3. Go to ZAP and enable the option "Edit" > "Enable Session Tracking (Cookie)" (needed to have the spider send the cookie "security");
4. Access the DVWA, while proxying through ZAP, and login, the "Welcome" page is shown (I'm using the account "admin"; ensure that the security level is "low", if not change it);
5. Go to ZAP and ensure that the request were proxied through ZAP (look at the "Sites" or "History" tabs);
6. Go to "Session properties" dialogue [1] and exclude from the spider the following pages:
- logout.php (example: \Qhttp://localhost/DVWA/logout.php\E), to not allow the spider to log out;
- security.php (example: \Qhttp://localhost/DVWA/security.php\E), to not allow the spider to change the security options;
- setup.php (example: \Qhttp://localhost/DVWA/setup.php\E), to not allow the spider to create/reset the database;
7. Delete all accessed pages except "index.php" (so the spider doesn't play with the login page/form);
8. Select the node "GET:index.php" and choose the option "Attack" > "Spider Site"; Wait for the spider to finish;
9. Check the "Sites" tab, there should be a leaf node "GET:sqli(Submit,Id)" under the node "vulnerabilities" (which means that the form was submitted);
10. Select the leaf node "GET:sqli(Submit,Id)" and choose the option "Attack" > "Active Scan single URL"; Wait for the scanner to finish;
11. Check the "Alerts" tab there should be a SQL Injection alert;
Let me know if those steps also work for you.
[1]
https://code.google.com/p/zaproxy/wiki/HelpUiDialogsSessionSesspropBest regards.