Contact Form user to Mailchimp Audience Security & Risk Analysis

wordpress.org/plugins/contact-form-user-to-mailchimp-audience

Plugin sends Contact Form 7 (first name, last name, email, phone) to Mailchimp Audience.

0 active installs v1.0.0 PHP 7.0+ WP 3.9+ Updated Sep 14, 2021
contact-form-7contact-form-7-mailchimpmailchimpmailchimp-formmailchimp-forms
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Contact Form user to Mailchimp Audience Safe to Use in 2026?

Generally Safe

Score 85/100

Contact Form user to Mailchimp Audience has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The plugin "contact-form-user-to-mailchimp-audience" v1.0.0 exhibits a generally good security posture based on static analysis. The absence of SQL queries executed without prepared statements, a high percentage of properly escaped output, and no recorded vulnerabilities in its history are positive indicators. The plugin also has a remarkably small attack surface, with zero identified entry points like AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces the potential for external exploitation. However, a concerning finding is the presence of one flow with unsanitized paths in the taint analysis, which, although not classified as critical or high severity in this instance, points to a potential area of weakness if input is not handled rigorously. Furthermore, the complete lack of nonce checks and capability checks, while seemingly benign given the limited attack surface, could become a vulnerability if new entry points are introduced or if the plugin's functionality were to expand in the future.

Key Concerns

  • Unsanitized path flow found in taint analysis
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Contact Form user to Mailchimp Audience Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Contact Form user to Mailchimp Audience Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
70 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

Output Escaping

96% escaped73 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<admin_menu> (admin_menu.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Contact Form user to Mailchimp Audience Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterwpcf7_mail_sentclass_wm_cf7_userto_mchimp.php:13
actioninitwm_cf7_userto_mchimp.php:44
actionadmin_menuwm_cf7_userto_mchimp.php:60
Maintenance & Trust

Contact Form user to Mailchimp Audience Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedSep 14, 2021
PHP min version7.0
Downloads897

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Contact Form user to Mailchimp Audience Developer Profile

superpuperlesha

4 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Contact Form user to Mailchimp Audience

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/contact-form-user-to-mailchimp-audience/js/wm_cf7_userto_mchimp.js
Script Paths
/wp-content/plugins/contact-form-user-to-mailchimp-audience/js/wm_cf7_userto_mchimp.js
Version Parameters
contact-form-user-to-mailchimp-audience/js/wm_cf7_userto_mchimp.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Contact Form user to Mailchimp Audience