
Add on for Sendinblue on Wpforms Security & Risk Analysis
wordpress.org/plugins/add-on-for-sendinblue-on-wpformsSendinBlue(Brevo) Add On for Integrate Sendinblue(Brevo) API to WPForms
Is Add on for Sendinblue on Wpforms Safe to Use in 2026?
Generally Safe
Score 100/100Add on for Sendinblue on Wpforms has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The static analysis of 'add-on-for-sendinblue-on-wpforms' v1.2 reveals a seemingly robust security posture with no identified dangerous functions, SQL injection vulnerabilities, or unescaped output. The complete absence of raw SQL queries and the 100% use of prepared statements are strong indicators of good database interaction practices. Furthermore, the lack of file operations and the consistent output escaping suggest a conscientious approach to preventing common web vulnerabilities. The plugin also makes several external HTTP requests, which, while not inherently a vulnerability, warrant careful review of the targeted endpoints for potential data leakage or man-in-the-middle risks if not properly secured.
The vulnerability history shows no recorded CVEs, which is highly positive and suggests a history of secure development or diligent patching. This, combined with the lack of critical or high-severity taint flows, contributes to an overall impression of a secure plugin. However, the complete absence of nonces and capability checks on entry points (AJAX, REST API, shortcodes, cron events) represents a significant concern. While the static analysis indicates zero unprotected entry points, the lack of these fundamental WordPress security mechanisms means that any future introduction of entry points or complex logic could easily become vulnerable if not meticulously secured with these checks. The minimal attack surface reported (zero entry points) is positive, but this could be a snapshot and the absence of protective measures is a structural weakness.
In conclusion, the plugin demonstrates strong internal code practices regarding SQL and output handling, and its vulnerability history is clean. The main area of concern is the lack of implemented nonce and capability checks across all potential entry points, which leaves room for future security weaknesses. The external HTTP requests also merit attention. The plugin is likely secure in its current state based on the static analysis, but a more proactive approach to fundamental WordPress security checks would further strengthen its overall security profile.
Key Concerns
- Missing nonce checks on entry points
- Missing capability checks on entry points
- External HTTP requests without explicit review
Add on for Sendinblue on Wpforms Security Vulnerabilities
Add on for Sendinblue on Wpforms Release Timeline
Add on for Sendinblue on Wpforms Code Analysis
Output Escaping
Add on for Sendinblue on Wpforms Attack Surface
WordPress Hooks 9
Maintenance & Trust
Add on for Sendinblue on Wpforms Maintenance & Trust
Maintenance Signals
Community Trust
Add on for Sendinblue on Wpforms Alternatives
Add on for Sendinblue(brevo) on Gravity Forms
gf-sendinblue
Gravity Form Sendinblue(brevo) Add On for Integrate Brevo API to Gravity Form
Donate to Access Content
cip-dtac-for-give
An Unoffcial Give plugin add-on to restrict site\'s content until donation is made.
Sticky Header Effects for Elementor
sticky-header-effects-for-elementor
Create advanced Sticky Headers in Elementor Free or Pro with scroll effects, blur, shrink, hide on scroll & full responsive controls.
Brevo – Email, SMS, Web Push, Chat, and more.
mailin
Turn your WordPress site into a marketing powerhouse. Grow your audience, boost engagement, and drive more sales with Brevo.
ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution
shopengine
WooCommerce builder for Elementor and Gutenberg. It offers product templates, product sliders, shopping cart, quick view, Woo wishlist, product filter …
Add on for Sendinblue on Wpforms Developer Profile
4 plugins · 90 total installs
How We Detect Add on for Sendinblue on Wpforms
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
wpforms-panel-content-section-tab_namedata-panel="tab_name"/wp-json/wpforms/v1/forms