
Contact Form SMS Notifications Security & Risk Analysis
wordpress.org/plugins/contact-form-sms-notificationsWorks with the Contact Form 7 plugin to send SMS notifications when somebody submits your contact form, using the API Configured By Site Admin
Is Contact Form SMS Notifications Safe to Use in 2026?
Generally Safe
Score 85/100Contact Form SMS Notifications has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'contact-form-sms-notifications' plugin version 1.2 exhibits a concerning security posture despite a clean vulnerability history. The static analysis reveals two unprotected AJAX entry points, which are significant security risks as they are accessible without any authentication or capability checks. Furthermore, the presence of the `unserialize` function is a critical red flag, especially when combined with a complete lack of output escaping and no nonce checks. This combination could allow an attacker to inject malicious serialized data, potentially leading to code execution or other severe vulnerabilities if user-supplied data is not properly sanitized before being unserialized.
While the plugin boasts zero known CVEs and uses prepared statements for all SQL queries, indicating good practices in database interaction, this is overshadowed by the critical vulnerabilities exposed in the static analysis. The taint analysis shows flows with unsanitized paths, although they are not categorized as critical or high severity. The absence of any output escaping on twelve outputs is a serious weakness, likely leading to Cross-Site Scripting (XSS) vulnerabilities. The lack of vulnerability history might suggest the plugin hasn't been heavily targeted or scrutinized, but it doesn't negate the immediate risks identified in the code. The plugin's strengths lie in its SQL handling, but its weaknesses in input validation and output sanitization, particularly concerning AJAX handlers and the `unserialize` function, create a high-risk profile.
Key Concerns
- Unprotected AJAX handlers
- Use of unserialize without context
- Output escaping is missing (12/12)
- Missing nonce checks on AJAX handlers
- Flows with unsanitized paths
- No capability checks
Contact Form SMS Notifications Security Vulnerabilities
Contact Form SMS Notifications Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Contact Form SMS Notifications Attack Surface
AJAX Handlers 2
WordPress Hooks 13
Maintenance & Trust
Contact Form SMS Notifications Maintenance & Trust
Maintenance Signals
Community Trust
Contact Form SMS Notifications Alternatives
Database Addon for Contact Form 7 – CFDB7
contact-form-cfdb7
Save and manage Contact Form 7 messages. Never lose important data. It is a lightweight contact form 7 database plugin.
ReCaptcha v2 for Contact Form 7
wpcf7-recaptcha
Adds reCaptcha v2 from Contact Form 7 5.0.5 that was dropped on Contact Form 7 5.1
Redirection for Contact Form 7
wpcf7-redirect
Redirect to any page or URL, execute scripts after submission, save data to the database, and unlock additional submission actions for Contact Form 7.
Conditional Fields for Contact Form 7
cf7-conditional-fields
Adds conditional logic to Contact Form 7.
Contact Form 7 – Dynamic Text Extension
contact-form-7-dynamic-text-extension
Extends Contact Form 7 by adding dynamic form fields that accepts shortcodes to prepopulate form fields with default values and dynamic placeholders.
Contact Form SMS Notifications Developer Profile
2 plugins · 30 total installs
How We Detect Contact Form SMS Notifications
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/contact-form-sms-notifications/css/style.css/wp-content/plugins/contact-form-sms-notifications/js/script.jscontact-form-sms-notifications/css/style.css?ver=contact-form-sms-notifications/js/script.js?ver=HTML / DOM Fingerprints
data-slugdata-templateContact_FormSI