Contact Form 7 Tiny MCE Security & Risk Analysis

wordpress.org/plugins/cf7-mce

Add tiny MCE to ContactForm7 editor

400 active installs v1.1.0 PHP + WP 3.1+ Updated Aug 14, 2015
cf7contact-form-7editorformtiny-mce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Contact Form 7 Tiny MCE Safe to Use in 2026?

Generally Safe

Score 85/100

Contact Form 7 Tiny MCE has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "cf7-mce" v1.1.0 plugin exhibits a strong security posture based on the provided static analysis results. The absence of any identified dangerous functions, raw SQL queries, unescaped output, file operations, or external HTTP requests suggests a well-written and secure codebase. The plugin also has no recorded vulnerability history, which further reinforces its current security. The complete lack of an attack surface, including AJAX handlers, REST API routes, shortcodes, and cron events, is a significant positive, as it means there are no direct entry points for attackers to exploit. This is an exceptionally rare and commendable finding.

However, the most notable observation is the complete absence of capability checks and nonce checks. While the current analysis shows no identifiable vulnerabilities, the lack of these fundamental security mechanisms means that if any functionality were to be introduced in the future, it would be inherently unprotected. This represents a significant potential future risk. The plugin's current zero-vulnerability status is excellent, but the reliance on a lack of attack surface for security, rather than robust, built-in access controls, is a weakness. It's strong in its current state but lacks defensive layers for potential future expansion or unforeseen attack vectors.

In conclusion, "cf7-mce" v1.1.0 is exceptionally secure at this version due to its minimal attack surface and clean code. The absence of any known vulnerabilities is a testament to its development quality. The primary area for concern is the complete lack of capability and nonce checks, which, while not an issue now, leaves the plugin vulnerable to exploitation should new features be added without proper security considerations. This is a case of security by obscurity rather than by design, which is a valid but fragile approach.

Key Concerns

  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

Contact Form 7 Tiny MCE Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Contact Form 7 Tiny MCE Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Contact Form 7 Tiny MCE Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwpcf7_admin_footercf7mce.php:12
Maintenance & Trust

Contact Form 7 Tiny MCE Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedAug 14, 2015
PHP min version
Downloads14K

Community Trust

Rating0/100
Number of ratings0
Active installs400
Developer Profile

Contact Form 7 Tiny MCE Developer Profile

Bastien Ho

12 plugins · 2K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
15 days
View full developer profile
Detection Fingerprints

How We Detect Contact Form 7 Tiny MCE

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cf7-mce/cf7mce.js
Script Paths
/wp-content/plugins/cf7-mce/cf7mce.js
Version Parameters
cf7mce.js?ver=

HTML / DOM Fingerprints

JS Globals
tinyMCE
Shortcode Output
<div id="tiny-mce-hidden-4-cf7"><textarea name="hiddeneditor" id="hiddeneditor" class="wp-editor-area">
FAQ

Frequently Asked Questions about Contact Form 7 Tiny MCE