CF7 Mailgun Domain Validation Security & Risk Analysis

wordpress.org/plugins/cf7-mailgun-domain-validation

Allows email addresses using your site’s Mailgun domain to pass Contact Form 7’s form validation feature.

10 active installs v1.0.2 PHP + WP 4.8+ Updated Unknown
cf7contact-formcontact-form-7contactform7validation
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is CF7 Mailgun Domain Validation Safe to Use in 2026?

Generally Safe

Score 100/100

CF7 Mailgun Domain Validation has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The static analysis of cf7-mailgun-domain-validation v1.0.2 reveals a remarkably clean codebase with no identifiable attack surface points, dangerous functions, or unescaped output. The absence of SQL queries not using prepared statements and file operations further indicates good secure coding practices. The taint analysis also shows no concerning flows. This suggests a very strong immediate security posture from the perspective of new vulnerabilities introduced by this specific version.

The vulnerability history is also entirely clear, with no recorded CVEs. This lack of historical issues, combined with the current clean code analysis, points towards a plugin that has either been very well-maintained and secured, or has a very limited scope and low visibility, thus not attracting significant exploit attempts or discovery of vulnerabilities. However, it's important to note that the complete absence of checks like nonces or capabilities on entry points, while not a direct vulnerability given the zero attack surface, could become a concern if the plugin were to be expanded or integrated with other functionalities in the future without the addition of these security measures.

In conclusion, this version of the plugin appears to be highly secure based on the provided data. The strengths lie in its lack of exploitable entry points, secure data handling (prepared statements, output escaping), and a clean vulnerability history. The only potential area for future consideration, though not an immediate risk, is the complete absence of any authorization checks on the defined entry points, which is a passive observation due to the current lack of any entry points.

Vulnerabilities
None known

CF7 Mailgun Domain Validation Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

CF7 Mailgun Domain Validation Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

CF7 Mailgun Domain Validation Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwpcf7_config_validator_validatecf7-mailgun-domain-validation.php:48
Maintenance & Trust

CF7 Mailgun Domain Validation Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.0
Last updatedUnknown
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

CF7 Mailgun Domain Validation Developer Profile

macbookandrew

11 plugins · 8K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
498 days
View full developer profile
Detection Fingerprints

How We Detect CF7 Mailgun Domain Validation

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about CF7 Mailgun Domain Validation