Contact Form 7: Add to Page Security & Risk Analysis

wordpress.org/plugins/cf7-add-to-page

A plugin that provides a drop-down of selectable forms for easy attachment to pages.

10 active installs v1.0.1 PHP + WP 4.8+ Updated Nov 18, 2017
contact-form-7contact-formswpcf7
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Contact Form 7: Add to Page Safe to Use in 2026?

Generally Safe

Score 85/100

Contact Form 7: Add to Page has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'cf7-add-to-page' plugin version 1.0.1 exhibits a generally strong security posture based on the provided static analysis. The absence of detected dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), file operations, and external HTTP requests are positive indicators. Furthermore, the presence of nonce and capability checks suggests an awareness of security best practices for controlling access to functionalities. The vulnerability history shows no known CVEs, which is encouraging and implies a clean track record thus far.

However, the static analysis does reveal a minor concern regarding output escaping, with 25% of identified outputs not being properly escaped. While this is not a critical finding given the limited number of outputs, it represents a potential vector for cross-site scripting (XSS) vulnerabilities if user-supplied data is involved in these unescaped outputs. The lack of any identified taint flows or a large attack surface with unprotected entry points is a significant strength, indicating that the plugin is not readily exposed to common web attacks.

In conclusion, 'cf7-add-to-page' v1.0.1 is a reasonably secure plugin with a clean vulnerability history. The primary area for improvement lies in ensuring all output is properly escaped to mitigate potential XSS risks. The limited attack surface and presence of access control checks are commendable strengths.

Key Concerns

  • Unescaped output identified
Vulnerabilities
None known

Contact Form 7: Add to Page Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Contact Form 7: Add to Page Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
3 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

75% escaped4 total outputs
Attack Surface

Contact Form 7: Add to Page Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadd_meta_boxes_pagecf7-add-to-page.php:20
actionsave_postcf7-add-to-page.php:22
filterthe_contentcf7-add-to-page.php:25
Maintenance & Trust

Contact Form 7: Add to Page Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedNov 18, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Contact Form 7: Add to Page Developer Profile

philiprabbett

3 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Contact Form 7: Add to Page

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
post-attributes-label-wrapperpost-attributes-label
Data Attributes
name="CF7_ID"id="CF7_ID"
Shortcode Output
[contact-form-7 id=
FAQ

Frequently Asked Questions about Contact Form 7: Add to Page