Caldera Forms – Sprout Invoices Integration Security & Risk Analysis

wordpress.org/plugins/caldera-forms-sprout-invoices-integration

Caldera Form Processor that connects a form to Sprout Invoices

10 active installs v1.0.0 PHP + WP 3.9+ Updated Sep 14, 2014
estimate-formform-integrationinvoicesprout-invoices
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Caldera Forms – Sprout Invoices Integration Safe to Use in 2026?

Generally Safe

Score 85/100

Caldera Forms – Sprout Invoices Integration has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The plugin 'caldera-forms-sprout-invoices-integration' v1.0.0 exhibits a seemingly secure static analysis profile with no identified AJAX handlers, REST API routes, shortcodes, or cron events acting as entry points. Furthermore, the code signals indicate no dangerous functions, file operations, or external HTTP requests. The use of prepared statements for all SQL queries is a positive security practice.

However, the analysis reveals a significant concern: 100% of output is not properly escaped. This represents a substantial risk for Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data that is not properly sanitized before being displayed in the browser can be leveraged by attackers. The absence of nonce checks and capability checks on any potential (though currently unlisted) entry points is also a weakness, leaving the plugin vulnerable to CSRF and unauthorized actions if entry points are discovered or added in future versions.

The vulnerability history is clean, with no recorded CVEs. This is a strong indicator of a well-maintained or less-targeted plugin. However, the lack of historical data does not negate the identified issues in the current code. The overall security posture is a mix of good practices (prepared statements) and significant risks (unsafely escaped output).

Key Concerns

  • 100% of outputs not properly escaped
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Caldera Forms – Sprout Invoices Integration Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Caldera Forms – Sprout Invoices Integration Release Timeline

v1.0.0Current
Code Analysis
Analyzed Apr 16, 2026

Caldera Forms – Sprout Invoices Integration Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
34
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

0% escaped34 total outputs
Attack Surface

Caldera Forms – Sprout Invoices Integration Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filtercaldera_forms_get_form_processorscf-sprout-invoice.php:15
filtercaldera_forms_get_entry_meta_sprout_invoicecf-sprout-invoice.php:18
actionsi_cloned_postcf-sprout-invoice.php:21
Maintenance & Trust

Caldera Forms – Sprout Invoices Integration Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedSep 14, 2014
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Caldera Forms – Sprout Invoices Integration Developer Profile

David Cramer

7 plugins · 1K total installs

90
trust score
Avg Security Score
85/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect Caldera Forms – Sprout Invoices Integration

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/caldera-forms-sprout-invoices-integration/img/sproutapps.png/wp-content/plugins/caldera-forms-sprout-invoices-integration/css/meta_style.css

HTML / DOM Fingerprints

JS Globals
transdata
FAQ

Frequently Asked Questions about Caldera Forms – Sprout Invoices Integration