Integration of CiviCRM's Form Processor with Caldera Forms Security & Risk Analysis

wordpress.org/plugins/cf-civicrm-formprocessor

This plugin integrates Caldera Forms with CiviCRM's form processor. Funded by CiviCooP, Civiservice.de, Bundesverband Soziokultur e.V.

100 active installs v1.0.1 PHP 7.2+ WP 5.2+ Updated Sep 19, 2023
civicrmcontact-formformforms
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Integration of CiviCRM's Form Processor with Caldera Forms Safe to Use in 2026?

Generally Safe

Score 85/100

Integration of CiviCRM's Form Processor with Caldera Forms has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The static analysis of cf-civicrm-formprocessor v1.0.1 reveals an exceptionally small attack surface with no identified entry points, which is a positive indicator. The absence of dangerous functions, file operations, and external HTTP requests further contributes to a seemingly secure codebase. Furthermore, all SQL queries are secured with prepared statements, and there's a complete lack of known vulnerabilities (CVEs) in its history, suggesting a well-maintained or rarely targeted plugin.

However, a significant concern arises from the output escaping. With 100% of outputs not being properly escaped, this plugin presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data processed and then displayed to users, whether directly or indirectly through the WordPress admin, could be manipulated. The complete absence of nonce and capability checks, while not directly exploitable due to the zero attack surface, indicates a potential weakness that could become exploitable if new entry points were introduced in future versions or through interaction with other plugins.

In conclusion, while the plugin benefits from a minimal attack surface and a clean vulnerability history, the critical flaw in output escaping poses a substantial risk. The lack of authorization checks also represents a missed security best practice that could be exploited if an attack vector is discovered. Addressing the output escaping issue is paramount to mitigating the immediate XSS risk.

Key Concerns

  • Outputs are not properly escaped
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Integration of CiviCRM's Form Processor with Caldera Forms Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Integration of CiviCRM's Form Processor with Caldera Forms Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped9 total outputs
Attack Surface

Integration of CiviCRM's Form Processor with Caldera Forms Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioncaldera_forms_pre_load_processorscf-civicrm-formprocessor.php:98
filtercaldera_forms_render_get_formcf-civicrm-formprocessor.php:104
actioncaldera_forms_autopopulate_typescf-civicrm-formprocessor.php:105
filtercaldera_forms_render_get_fieldcf-civicrm-formprocessor.php:106
filtercaldera_forms_field_option_presetscf-civicrm-formprocessor.php:107
filtercaldera_forms_do_field_magic_valuecf-civicrm-formprocessor.php:194
Maintenance & Trust

Integration of CiviCRM's Form Processor with Caldera Forms Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedSep 19, 2023
PHP min version7.2
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Integration of CiviCRM's Form Processor with Caldera Forms Developer Profile

Jaap Jansma

6 plugins · 540 total installs

82
trust score
Avg Security Score
91/100
Avg Patch Time
62 days
View full developer profile
Detection Fingerprints

How We Detect Integration of CiviCRM's Form Processor with Caldera Forms

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cf-civicrm-formprocessor/includes/class-local-civicrm.php/wp-content/plugins/cf-civicrm-formprocessor/includes/class-formprocessor-loader.php/wp-content/plugins/cf-civicrm-formprocessor/processors/formprocessor/class-formprocessor-processor.php

HTML / DOM Fingerprints

Data Attributes
auto_type
FAQ

Frequently Asked Questions about Integration of CiviCRM's Form Processor with Caldera Forms