Contact Form 7 – Freshsales CRM Security & Risk Analysis

wordpress.org/plugins/connect-cf-7-freshsales-crm

Just another contact form plugin. Simple but flexible.

10 active installs v1.1.1 PHP + WP 4.9+ Updated Jun 17, 2021
contact-form-7-freshsales-crmfreshsales
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Contact Form 7 – Freshsales CRM Safe to Use in 2026?

Generally Safe

Score 85/100

Contact Form 7 – Freshsales CRM has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "connect-cf-7-freshsales-crm" plugin version 1.1.1 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by not exposing a large attack surface through AJAX, REST API, or shortcodes, and it has no recorded vulnerabilities or CVEs, indicating a history of stable security. Furthermore, all SQL queries utilize prepared statements, which is a strong defense against SQL injection. However, there are significant areas of concern within the code analysis. The presence of the "unserialize" function, especially without accompanying capability checks or nonce checks, is a major red flag, as it can be exploited to execute arbitrary code if untrusted data is passed to it. The low percentage of properly escaped output (39%) also presents a risk of cross-site scripting (XSS) vulnerabilities, particularly if the unescaped output contains user-supplied data. While taint analysis found no critical or high-severity unsanitized paths, the three flows with unsanitized paths, combined with the "unserialize" function and poor output escaping, suggest potential for vulnerabilities that might not have been fully captured by the automated analysis.

In conclusion, while the plugin's lack of historical vulnerabilities and its use of prepared statements are commendable, the static analysis reveals critical weaknesses. The "unserialize" function and the significant amount of unescaped output represent substantial risks. The absence of capability and nonce checks on these potentially dangerous areas exacerbates these risks. It is strongly recommended that these issues be addressed immediately to mitigate the potential for severe security breaches.

Key Concerns

  • Dangerous function "unserialize" used without auth checks
  • Low percentage of properly escaped output (39%)
  • Flows with unsanitized paths (3)
  • No nonce checks detected
  • No capability checks detected
Vulnerabilities
None known

Contact Form 7 – Freshsales CRM Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Contact Form 7 – Freshsales CRM Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Contact Form 7 – Freshsales CRM Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
17
11 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
2
Bundled Libraries
0

Dangerous Functions Found

unserialize$modules = unserialize( get_option( 'cf7_fs_go_modules' ) );includes\admin\admin.php:36
unserialize$modules = unserialize( get_option( 'cf7_fs_go_modules' ) );includes\admin\admin.php:143

Output Escaping

39% escaped28 total outputs
Data Flows · Security
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
cf7_fs_go_integration_callback (includes\admin\admin.php:91)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Contact Form 7 – Freshsales CRM Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuincludes\admin\admin.php:10
actionwpcf7_before_send_mailincludes\functions.php:11
Maintenance & Trust

Contact Form 7 – Freshsales CRM Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedJun 17, 2021
PHP min version
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Contact Form 7 – Freshsales CRM Developer Profile

Rakesh Rathore

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Contact Form 7 – Freshsales CRM

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
connect-cf-7-freshsales-crm/includes/js/cf7-freshsales-integration.js?ver=

HTML / DOM Fingerprints

CSS Classes
cf7_fs_go_fieldscf7_fs_go_module
HTML Comments
<!-- Connect CF 7 - Freshsales CRM --><!-- This is a constant variable for plugin path. --><!-- This is a file for includes core functionality. --><!-- This is a function that run when plugin activation. -->+3 more
Data Attributes
name="cf7_fs_go_instance_url"name="cf7_fs_go_api_key"name="cf7_fs_go_module"name="cf7_fs_go_fields"name="cf7_fs_go"
JS Globals
cf7_fs_go_instance_urlcf7_fs_go_api_keycf7_fs_go_modulescf7_fs_go_modules_fieldscf7_fs_go_modulecf7_fs_go+1 more
FAQ

Frequently Asked Questions about Contact Form 7 – Freshsales CRM