Contact Form 7 Widget Security & Risk Analysis

wordpress.org/plugins/contact-form-7-widget

Use your Contact Form 7 forms and other shortcodes in your sidebars.

2K active installs v1.0 PHP + WP 2.8+ Updated Nov 28, 2017
contactcontact-formsidebarwidgetwidgets
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Contact Form 7 Widget Safe to Use in 2026?

Generally Safe

Score 85/100

Contact Form 7 Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "contact-form-7-widget" v1.0 plugin exhibits a generally good security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events signifies a very small attack surface, with no apparent entry points that are unprotected. Furthermore, the code uses prepared statements exclusively for SQL queries, and there are no file operations or external HTTP requests, which are all positive security indicators.

However, a significant concern arises from the output escaping. With 61 total outputs, only 26% are properly escaped, indicating a high potential for Cross-Site Scripting (XSS) vulnerabilities. This means that data processed or displayed by the plugin might not be sufficiently sanitized, leaving it vulnerable to injection attacks. The lack of nonce checks and capability checks on any potential entry points (though none were identified) is also a weakness, as these are fundamental security mechanisms for WordPress plugins.

Given the plugin's history of zero known CVEs and no recorded vulnerabilities, it suggests that either the plugin has historically been secure, or it has not been subjected to rigorous security testing or targeted attacks. However, the current static analysis reveals a critical weakness in output escaping that could lead to vulnerabilities even without a prior history. The strength lies in its limited attack surface and proper SQL handling, but the weakness in output sanitization poses a significant risk.

Key Concerns

  • High percentage of unescaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Contact Form 7 Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Contact Form 7 Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
45
16 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

26% escaped61 total outputs
Attack Surface

Contact Form 7 Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initcontact-form-7-widget.php:106
Maintenance & Trust

Contact Form 7 Widget Maintenance & Trust

Maintenance Signals

WordPress version tested2.8.4
Last updatedNov 28, 2017
PHP min version
Downloads101K

Community Trust

Rating100/100
Number of ratings4
Active installs2K
Developer Profile

Contact Form 7 Widget Developer Profile

Strategy11 Team

8 plugins · 316K total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
844 days
View full developer profile
Detection Fingerprints

How We Detect Contact Form 7 Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
cf7_widget_subheading
Shortcode Output
[contact-formContact form
FAQ

Frequently Asked Questions about Contact Form 7 Widget