Contact Form 7 to Post Security & Risk Analysis

wordpress.org/plugins/contact-form-7-to-post

Save contact form 7 submissions as new posts

10 active installs v1.0.0 PHP + WP 4.0+ Updated Jun 2, 2015
cf7contact-form-7contactform7edit-on-frontpost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Contact Form 7 to Post Safe to Use in 2026?

Generally Safe

Score 85/100

Contact Form 7 to Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The static analysis of Contact Form 7 to Post v1.0.0 shows a generally strong security posture, with no identified dangerous functions, SQL injection risks (all queries use prepared statements), or file operations. The high percentage of properly escaped output (92%) is also a positive indicator of secure coding practices. The absence of external HTTP requests and the lack of any recorded vulnerabilities in its history further contribute to a perception of a low-risk plugin.

However, the analysis also reveals significant potential weaknesses. The complete lack of capability checks and nonce checks on any potential entry points is a major concern. While the reported attack surface (AJAX, REST API, shortcodes, cron) is currently zero, this could change with future updates or if the plugin's functionality were to expand. If any of these entry points were to be implemented without proper authentication and authorization, it would create immediate and severe security vulnerabilities.

In conclusion, Contact Form 7 to Post v1.0.0 exhibits good basic security hygiene in its current state. Nevertheless, the absence of crucial security mechanisms like capability and nonce checks represents a substantial latent risk. The plugin's vulnerability history is clean, but this cannot compensate for the fundamental security controls that are missing. Future development should prioritize the implementation of these checks to mitigate potential attack vectors.

Key Concerns

  • No capability checks implemented
  • No nonce checks implemented
Vulnerabilities
None known

Contact Form 7 to Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Contact Form 7 to Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
23 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

92% escaped25 total outputs
Attack Surface

Contact Form 7 to Post Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwpcf7_before_send_mailcf72post.php:22
actionwpcf7_add_meta_boxescf72post.php:23
actionwpcf7_admin_after_formcf72post.php:24
actionwpcf7_save_contact_formcf72post.php:25
Maintenance & Trust

Contact Form 7 to Post Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedJun 2, 2015
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Contact Form 7 to Post Developer Profile

Bastien Ho

12 plugins · 2K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
15 days
View full developer profile
Detection Fingerprints

How We Detect Contact Form 7 to Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
half-leftpost-fieldhalf-right
Data Attributes
id="wpcf7-form-post-type"name="wpcf7-form-post-type"id="wpcf7-form-post-status"name="wpcf7-form-post-status"id="wpcf7-form-post-title"name="wpcf7-form-post-title"+2 more
Shortcode Output
[your-subject][your-message]
FAQ

Frequently Asked Questions about Contact Form 7 to Post