Contact Form 7 Editor Button Security & Risk Analysis

wordpress.org/plugins/cf7-editor-button

Adds a custom button to TinyMCE WordPress editor to insert shortcodes for Contact Form 7 plugin.

200 active installs v1.0.0 PHP + WP 4.0+ Updated Apr 1, 2023
cf7-buttoncontact-formcontact-form-7-buttoncontact-form-shortcodetinymce-button
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEJul 7, 2025
Safety Verdict

Is Contact Form 7 Editor Button Safe to Use in 2026?

Use With Caution

Score 63/100

Contact Form 7 Editor Button has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Jul 7, 2025Updated 3yr ago
Risk Assessment

The "cf7-editor-button" plugin version 1.0.0 presents a mixed security posture. On the positive side, the static analysis indicates a very small attack surface with no detected AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, there are no dangerous functions or file operations identified, and no external HTTP requests are made. However, significant concerns arise from the presence of SQL queries without prepared statements, indicating a potential for SQL injection vulnerabilities. The output escaping also shows a weakness, with one-third of outputs not being properly escaped, creating a risk of Cross-Site Scripting (XSS) flaws.

The plugin's vulnerability history is particularly worrying, with one known medium-severity CVE related to XSS that remains unpatched. The fact that this vulnerability is dated in the future (2025-07-07) suggests a potential error in the provided data or a forward-looking indicator of a severe oversight in security patching. Regardless, the existence of an unpatched vulnerability, coupled with the identified code signals of raw SQL and unescaped output, paints a picture of a plugin that requires immediate attention to address existing security flaws and prevent future exploitation.

In conclusion, while the plugin boasts a small attack surface and avoids certain common risky practices, the unpatched XSS vulnerability, combined with the presence of raw SQL queries and insufficient output escaping, constitutes a significant security risk. The lack of nonce and capability checks on entry points, though currently minimal, could become a problem if the plugin's functionality expands. Users should exercise extreme caution or consider alternative plugins until these issues are thoroughly addressed and patched.

Key Concerns

  • Unpatched CVE
  • SQL queries not using prepared statements
  • Improper output escaping detected
  • No capability checks
  • No nonce checks
Vulnerabilities
1

Contact Form 7 Editor Button Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-48345medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Contact Form 7 Editor Button <= 1.0.0 - Reflected Cross-Site Scripting

Jul 7, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Contact Form 7 Editor Button Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
1
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

67% escaped3 total outputs
Attack Surface

Contact Form 7 Editor Button Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionplugins_loadedcontact-form-7-editor-button.php:70
actionadmin_noticescontact-form-7-editor-button.php:84
actionadmin_enqueue_scriptsincludes\class-plugin.php:16
actionadmin_menuincludes\class-plugin.php:17
actionadmin_initincludes\class-plugin.php:18
actioninitincludes\class-plugin.php:21
filtermce_external_languagesincludes\class-plugin.php:71
filtermce_buttonsincludes\class-plugin.php:75
filtermce_external_pluginsincludes\class-plugin.php:81
actionadmin_headincludes\views\settings\class-html.php:17
Maintenance & Trust

Contact Form 7 Editor Button Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.0
Last updatedApr 1, 2023
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs200
Developer Profile

Contact Form 7 Editor Button Developer Profile

arisoft

4 plugins · 17K total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
197 days
View full developer profile
Detection Fingerprints

How We Detect Contact Form 7 Editor Button

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cf7-editor-button/includes/assets/css/admin.css/wp-content/plugins/cf7-editor-button/includes/assets/js/admin.js
Script Paths
/wp-content/plugins/cf7-editor-button/includes/assets/js/admin.js
Version Parameters
ari-cf7button-appcf7-editor-button/includes/assets/css/admin.css?ver=cf7-editor-button/includes/assets/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
ari-cf7button-settingsari-cf7button_plugin
Data Attributes
data-cf7b-modal
JS Globals
ari_cf7button
FAQ

Frequently Asked Questions about Contact Form 7 Editor Button