inoday-Web-to-Lead-Zoho Security & Risk Analysis

wordpress.org/plugins/cf7-leads-integrate-in-zoho

"inoday Web-to-Lead Zoho" will sync the lead or enquiry with Zoho CRM after contact form submission.

10 active installs v1.3.1 PHP + WP 3.7+ Updated Aug 10, 2017
contact-form-7web-to-leadzoho
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is inoday-Web-to-Lead-Zoho Safe to Use in 2026?

Generally Safe

Score 85/100

inoday-Web-to-Lead-Zoho has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The static analysis of "cf7-leads-integrate-in-zoho" v1.3.1 reveals a plugin with a very small attack surface. There are no identifiable AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces the opportunities for attackers to interact with the plugin directly. Furthermore, the code signals indicate a clean state regarding dangerous functions, SQL queries (all prepared), and file operations. This suggests good practices in these areas.

However, the analysis does highlight a significant concern with output escaping, where only 33% of the identified outputs are properly escaped. This could potentially lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is rendered without adequate sanitization. The absence of nonce checks and capability checks on any entry points (as there are none identified) is not a direct vulnerability in itself but points to a lack of robust authorization mechanisms if any entry points were to be discovered or added in future versions. The plugin has no recorded vulnerability history, which is a positive indicator of its past security, but this should not be taken as a guarantee against future issues, especially given the output escaping concerns.

In conclusion, while the plugin exhibits strengths in minimizing its attack surface and secure database interactions, the insufficient output escaping is a notable weakness that warrants attention. The lack of any past vulnerabilities is reassuring, but the identified code signals suggest that future development should prioritize comprehensive output sanitization to mitigate potential XSS risks.

Key Concerns

  • Insufficient output escaping
Vulnerabilities
None known

inoday-Web-to-Lead-Zoho Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

inoday-Web-to-Lead-Zoho Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

inoday-Web-to-Lead-Zoho Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped3 total outputs
Attack Surface

inoday-Web-to-Lead-Zoho Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuadmin/admin.php:5
actionadmin_initadmin/admin.php:31
actionwpcf7_before_send_mailzoholeads.php:19
Maintenance & Trust

inoday-Web-to-Lead-Zoho Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedAug 10, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

inoday-Web-to-Lead-Zoho Developer Profile

inoday

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect inoday-Web-to-Lead-Zoho

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about inoday-Web-to-Lead-Zoho