
WP Zoho for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms – CRM, Bigin Security & Risk Analysis
wordpress.org/plugins/cf7-zohoSend Contact Form 7, WPforms, Elementor, Formidable, Ninja Forms and many other contact form submissions to zoho CRM and Bigin.
Is WP Zoho for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms – CRM, Bigin Safe to Use in 2026?
Generally Safe
Score 90/100WP Zoho for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms – CRM, Bigin has a strong security track record. Known vulnerabilities have been patched promptly.
The 'cf7-zoho' plugin version 1.3.3 presents a mixed security posture. While the static analysis indicates a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that lack authentication or permission checks, there are concerning signals within the code itself. The presence of the `unserialize` function, a known source of deserialization vulnerabilities, without explicit checks for untrusted input is a significant red flag. Although no critical or high severity taint flows were found, this function's usage could potentially be exploited if data intended for serialization is manipulated by an attacker. Furthermore, while a majority of SQL queries use prepared statements and a good percentage of output is properly escaped, the remaining portions suggest potential for SQL injection and cross-site scripting vulnerabilities if not handled carefully in all cases.
The plugin's vulnerability history is a major concern, with five known CVEs recorded, including one critical, one high, and three medium. The types of past vulnerabilities (Deserialization of Untrusted Data, SQL Injection, CSRF, XSS) align with the types of weaknesses that could be introduced by the identified code signals. The fact that the last vulnerability was dated in the near future (2025-06-16) suggests a pattern of past security flaws, even if none are currently marked as unpatched. This history indicates a need for diligent review and patching of any future discovered vulnerabilities.
In conclusion, while the plugin has a small attack surface and shows some good practices like the use of prepared statements and nonces, the presence of `unserialize` and a history of serious vulnerabilities necessitate caution. The code signals and historical data suggest potential for significant security issues if not addressed proactively. Continued vigilance and code auditing are recommended.
Key Concerns
- Presence of dangerous function: unserialize
- Known CVEs: 5 total (1 critical, 1 high, 3 medium)
- SQL queries not using prepared statements (24%)
- Output escaping not properly handled (24%)
WP Zoho for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms – CRM, Bigin Security Vulnerabilities
CVEs by Year
Severity Breakdown
5 total CVEs
Integration for Contact Form 7 and Zoho CRM, Bigin <= 1.3.0 - Unauthenticated PHP Object Injection
Integration for Contact Form 7 and Zoho CRM, Bigin <= 1.2.3 - Authenticated (Admin+) SQL Injection
Integration for Contact Form 7 and Zoho CRM, Bigin <= 1.2.2 - Cross-Site Request Forgery via settings_page function
CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting
Integration for Contact Form 7 and Zoho CRM, Bigin <= 1.1.7 - Cross-Site Scripting
WP Zoho for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms – CRM, Bigin Code Analysis
Dangerous Functions Found
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
WP Zoho for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms – CRM, Bigin Attack Surface
WordPress Hooks 39
Maintenance & Trust
WP Zoho for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms – CRM, Bigin Maintenance & Trust
Maintenance Signals
Community Trust
WP Zoho for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms – CRM, Bigin Alternatives
WP Zoho for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms – CRM, Bigin Developer Profile
32 plugins · 105K total installs
How We Detect WP Zoho for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms – CRM, Bigin
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/cf7-zoho/assets/css/main.css/wp-content/plugins/cf7-zoho/assets/js/main.js/wp-content/plugins/cf7-zoho/assets/js/vendor/jquery.validate.min.js/wp-content/plugins/cf7-zoho/assets/js/vendor/sweetalert.min.js/wp-content/plugins/cf7-zoho/admin/assets/css/admin.css/wp-content/plugins/cf7-zoho/admin/assets/js/admin.js/wp-content/plugins/cf7-zoho/assets/js/main.js/wp-content/plugins/cf7-zoho/assets/js/vendor/jquery.validate.min.js/wp-content/plugins/cf7-zoho/assets/js/vendor/sweetalert.min.js/wp-content/plugins/cf7-zoho/admin/assets/js/admin.jscf7-zoho/assets/css/main.css?ver=cf7-zoho/assets/js/main.js?ver=cf7-zoho/assets/js/vendor/jquery.validate.min.js?ver=cf7-zoho/assets/js/vendor/sweetalert.min.js?ver=cf7-zoho/admin/assets/css/admin.css?ver=cf7-zoho/admin/assets/js/admin.js?ver=HTML / DOM Fingerprints
cf7-zoho-admin-wrapdata-crmperks-plugin-iddata-crmperks-slugvxcf_zoho_data