
Contact Form 7 – Freshsales CRM Security & Risk Analysis
wordpress.org/plugins/connect-cf-7-freshsales-crmJust another contact form plugin. Simple but flexible.
Is Contact Form 7 – Freshsales CRM Safe to Use in 2026?
Generally Safe
Score 85/100Contact Form 7 – Freshsales CRM has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "connect-cf-7-freshsales-crm" plugin version 1.1.1 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by not exposing a large attack surface through AJAX, REST API, or shortcodes, and it has no recorded vulnerabilities or CVEs, indicating a history of stable security. Furthermore, all SQL queries utilize prepared statements, which is a strong defense against SQL injection. However, there are significant areas of concern within the code analysis. The presence of the "unserialize" function, especially without accompanying capability checks or nonce checks, is a major red flag, as it can be exploited to execute arbitrary code if untrusted data is passed to it. The low percentage of properly escaped output (39%) also presents a risk of cross-site scripting (XSS) vulnerabilities, particularly if the unescaped output contains user-supplied data. While taint analysis found no critical or high-severity unsanitized paths, the three flows with unsanitized paths, combined with the "unserialize" function and poor output escaping, suggest potential for vulnerabilities that might not have been fully captured by the automated analysis.
In conclusion, while the plugin's lack of historical vulnerabilities and its use of prepared statements are commendable, the static analysis reveals critical weaknesses. The "unserialize" function and the significant amount of unescaped output represent substantial risks. The absence of capability and nonce checks on these potentially dangerous areas exacerbates these risks. It is strongly recommended that these issues be addressed immediately to mitigate the potential for severe security breaches.
Key Concerns
- Dangerous function "unserialize" used without auth checks
- Low percentage of properly escaped output (39%)
- Flows with unsanitized paths (3)
- No nonce checks detected
- No capability checks detected
Contact Form 7 – Freshsales CRM Security Vulnerabilities
Contact Form 7 – Freshsales CRM Release Timeline
Contact Form 7 – Freshsales CRM Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Contact Form 7 – Freshsales CRM Attack Surface
WordPress Hooks 2
Maintenance & Trust
Contact Form 7 – Freshsales CRM Maintenance & Trust
Maintenance Signals
Community Trust
Contact Form 7 – Freshsales CRM Alternatives
Freshsales Integration for WordPress
wp-freshsales
Streamline Lead Capture, User Sync, and CRM Integration Effortlessly with WP Freshsales - Your All-in-One Solution
Integration for Freshsales – Contact Form 7, WPForms, Elementor, Gravity Forms and More
crm-integration-freshworks-any-form
Connect Contact Form 7, WPForms, Elementor Forms, Gravity Forms, and more form submissions with Freshsales CRM.
Contact Form 7 – Freshsales CRM Developer Profile
1 plugin · 10 total installs
How We Detect Contact Form 7 – Freshsales CRM
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
connect-cf-7-freshsales-crm/includes/js/cf7-freshsales-integration.js?ver=HTML / DOM Fingerprints
cf7_fs_go_fieldscf7_fs_go_module<!-- Connect CF 7 - Freshsales CRM --><!-- This is a constant variable for plugin path. --><!-- This is a file for includes core functionality. --><!-- This is a function that run when plugin activation. -->+3 morename="cf7_fs_go_instance_url"name="cf7_fs_go_api_key"name="cf7_fs_go_module"name="cf7_fs_go_fields"name="cf7_fs_go"cf7_fs_go_instance_urlcf7_fs_go_api_keycf7_fs_go_modulescf7_fs_go_modules_fieldscf7_fs_go_modulecf7_fs_go+1 more