Database Addon for Contact Form 7 – CFDB7 Security & Risk Analysis

wordpress.org/plugins/contact-form-cfdb7

Save and manage Contact Form 7 messages. Never lose important data. It is a lightweight contact form 7 database plugin.

600K active installs v1.3.5 PHP 7.0+ WP 4.8+ Updated Feb 1, 2026
cf7cf7-databasecontact-form-7contact-form-7-dbwpcf7
90
A · Safe
CVEs total7
Unpatched0
Last CVEJul 3, 2025
Safety Verdict

Is Database Addon for Contact Form 7 – CFDB7 Safe to Use in 2026?

Generally Safe

Score 90/100

Database Addon for Contact Form 7 – CFDB7 has a strong security track record. Known vulnerabilities have been patched promptly.

7 known CVEsLast CVE: Jul 3, 2025Updated 2mo ago
Risk Assessment

The "contact-form-cfdb7" plugin version 1.3.5 presents a mixed security posture. While the static analysis indicates a seemingly small attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication or permission checks, there are significant underlying concerns. The presence of the `unserialize` function, a known source of vulnerabilities, combined with a substantial number of SQL queries where only 27% utilize prepared statements, raises red flags regarding potential injection attacks. Furthermore, the output escaping is only properly implemented in 65% of cases, indicating a risk of Cross-Site Scripting (XSS) vulnerabilities.

The plugin's vulnerability history is particularly concerning, with a total of 7 known CVEs, including 3 high-severity vulnerabilities. The types of past vulnerabilities—XSS, information exposure, CSV injection, CSRF, general injection, and SQL injection—paint a picture of an application that has historically struggled with input validation and output sanitization. While there are currently no unpatched CVEs, the recurring nature and severity of past issues suggest a propensity for exploitable flaws. The last vulnerability recorded in July 2025 indicates ongoing development or discovery of issues, though its recency might be an artifact of data reporting.

In conclusion, despite a minimal exposed attack surface in this specific version, the plugin's history of critical and high-severity vulnerabilities, coupled with the static analysis findings of dangerous functions like `unserialize` and inadequate prepared statement usage for SQL queries, points to a considerable risk. The less-than-ideal output escaping further exacerbates this risk. Users should exercise extreme caution and consider alternatives if possible.

Key Concerns

  • Dangerous function 'unserialize' used
  • Low percentage of SQL prepared statements
  • Inadequate output escaping
  • History of 3 high-severity CVEs
  • History of 4 medium-severity CVEs
  • Flow with unsanitized paths detected
Vulnerabilities
7

Database Addon for Contact Form 7 – CFDB7 Security Vulnerabilities

CVEs by Year

4 CVEs in 2021
2021
1 CVE in 2022
2022
1 CVE in 2024
2024
1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

High
3
Medium
4

7 total CVEs

CVE-2025-6740medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Contact Form 7 Database Addon <= 1.3.1 - Unauthenticated Stored Cross-Site Scripting via tmpD Parameter

Jul 3, 2025 Patched in 1.3.2 (1d)
CVE-2024-3870medium · 5.3Exposure of Sensitive Information to an Unauthorized Actor

Contact Form 7 Database Addon – CFDB7 <= 1.2.6.8 - Unauthenticated Sensitive Information Exposure

Apr 26, 2024 Patched in 1.2.7 (7d)
CVE-2022-3634high · 7.2Improper Neutralization of Formula Elements in a CSV File

Contact Form 7 Database Addon <= 1.2.6.3 - CSV Injection

Oct 27, 2022 Patched in 1.2.6.5 (453d)
CVE-2021-36886medium · 6.5Cross-Site Request Forgery (CSRF)

Contact Form 7 Database Addon – CFDB7 plugin <= 1.2.5.9 - Cross-Site Request Forgery

Nov 12, 2021 Patched in 1.2.6.1 (802d)
CVE-2021-36885medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Contact Form 7 Database Addon – CFDB7 <= 1.2.6.1 - Unauthenticated Stored Cross-Site Scripting

Nov 12, 2021 Patched in 1.2.6.2 (802d)
CVE-2021-24144high · 8.8Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Contact Form 7 Database Addon <= 1.2.5.4 - CSV Injection

Jan 25, 2021 Patched in 1.2.5.6 (1093d)
WF-22f79a03-9195-4d5d-a189-9b5e1d3307c8-contact-form-cfdb7high · 8.8Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Contact Form 7 Database Addon <= 1.2.5.3 - SQL Injection

Jan 19, 2021 Patched in 1.2.5.4 (1099d)
Code Analysis
Analyzed Mar 16, 2026

Database Addon for Contact Form 7 – CFDB7 Code Analysis

Dangerous Functions
8
Raw SQL Queries
16
6 prepared
Unescaped Output
11
20 escaped
Nonce Checks
3
Capability Checks
1
File Operations
7
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize<?php $form_data = unserialize( $result->form_value, ['allowed_classes' => false] );inc\admin-form-details.php:50
unserialize$first_row = isset($results[0]) ? unserialize( $results[0]->form_value, ['allowed_classesinc\admin-subpage.php:130
unserialize$form_value = unserialize( $result->form_value, ['allowed_classes' => false] );inc\admin-subpage.php:244
unserialize$result_values = unserialize($result_value, ['allowed_classes' => false]);inc\admin-subpage.php:319
unserialize$result_values = unserialize( $result_value, ['allowed_classes' => false] );inc\admin-subpage.php:349
unserialize$result_values = unserialize( $result_value, ['allowed_classes' => false] );inc\admin-subpage.php:369
unserialize$heading_row = unserialize( $heading_row->form_value, ['allowed_classes' => false] );inc\export-csv.php:88
unserialize$resultTmp = unserialize( $result->form_value, ['allowed_classes' => false] );inc\export-csv.php:114

SQL Query Safety

27% prepared22 total queries

Output Escaping

65% escaped31 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
bulk_actions (inc\admin-subpage.php:432)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Database Addon for Contact Form 7 – CFDB7 Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionupgrader_process_completecontact-form-cfdb-7.php:84
actionwpcf7_before_send_mailcontact-form-cfdb-7.php:195
actioninitcontact-form-cfdb-7.php:198
actionadmin_noticescontact-form-cfdb-7.php:231
actionadmin_initcontact-form-cfdb-7.php:232
actionplugins_loadedcontact-form-cfdb-7.php:319
actionadmin_menuinc\admin-mainpage.php:18
Maintenance & Trust

Database Addon for Contact Form 7 – CFDB7 Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 1, 2026
PHP min version7.0
Downloads8.1M

Community Trust

Rating100/100
Number of ratings1,872
Active installs600K
Developer Profile

Database Addon for Contact Form 7 – CFDB7 Developer Profile

Arshid

6 plugins · 621K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
814 days
View full developer profile
Detection Fingerprints

How We Detect Database Addon for Contact Form 7 – CFDB7

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/contact-form-cfdb7/css/admin-style.css

HTML / DOM Fingerprints

CSS Classes
wp-list-tablewidefatfixedstripedpagesuserscfdb7-main-pagewrap+1 more
Data Attributes
data-cfdb7-action
FAQ

Frequently Asked Questions about Database Addon for Contact Form 7 – CFDB7