CP Contact Form with PayPal Security & Risk Analysis

wordpress.org/plugins/cp-contact-form-with-paypal

Easily create contact forms with integrated PayPal payments. Accept service payments, orders, and more with a drag-and-drop form builder.

900 active installs v1.3.63 PHP + WP 3.0.5+ Updated Mar 12, 2026
paymentpayment-formpaypalpaypal-donationpaypal-form
88
A · Safe
CVEs total7
Unpatched0
Last CVENov 21, 2025
Safety Verdict

Is CP Contact Form with PayPal Safe to Use in 2026?

Generally Safe

Score 88/100

CP Contact Form with PayPal has a strong security track record. Known vulnerabilities have been patched promptly.

7 known CVEsLast CVE: Nov 21, 2025Updated 22d ago
Risk Assessment

The "cp-contact-form-with-paypal" plugin version 1.3.63 presents a mixed security posture. While it demonstrates good practices like a high percentage of properly escaped output and a reasonable number of nonce and capability checks, several significant concerns are present. The static analysis highlights a substantial attack surface with 4 entry points, 2 of which lack authentication checks, indicating potential for unauthorized access. The presence of 6 'unserialize' function calls is a red flag, as deserialization vulnerabilities are a common and severe threat. Furthermore, the taint analysis reveals 4 high-severity flows with unsanitized paths, directly pointing to potential security weaknesses that could be exploited.

The plugin's vulnerability history is concerning, with a total of 7 known CVEs, all of which are currently patched. However, the breakdown shows 3 high and 4 medium severity vulnerabilities in the past, with common types including CSRF, missing authorization, XSS, and SQL injection. This historical pattern suggests recurring security weaknesses, particularly around input validation and authorization. The prevalence of these types of vulnerabilities, even if patched, indicates a need for more robust security development practices within the plugin.

In conclusion, while the plugin has strengths in output escaping and some authorization checks, the significant attack surface without proper authentication, the presence of dangerous functions like unserialize, and the historical pattern of high and medium severity vulnerabilities necessitate caution. Users should be aware of the potential risks and ensure the plugin is kept updated, although the absence of currently unpatched CVEs is a positive sign. The 4 high-severity taint flows and unprotected AJAX handlers are the most immediate technical concerns identified in the code.

Key Concerns

  • 2 unprotected AJAX handlers
  • 4 high severity unsanitized flows
  • 6 dangerous functions (unserialize)
  • 3 high severity past CVEs
  • 4 medium severity past CVEs
  • Total attack surface with unprotected entry points
Vulnerabilities
7

CP Contact Form with PayPal Security Vulnerabilities

CVEs by Year

2 CVEs in 2015
2015
2 CVEs in 2019
2019
1 CVE in 2023
2023
2 CVEs in 2025
2025
Patched Has unpatched

Severity Breakdown

High
3
Medium
4

7 total CVEs

CVE-2025-13384high · 7.5Missing Authorization

CP Contact Form with PayPal <= 1.3.56 - Missing Authorization to Unauthenticated Arbitrary Payment Confirmation

Nov 21, 2025 Patched in 1.3.57 (1d)
CVE-2024-13758medium · 6.5Cross-Site Request Forgery (CSRF)

CP Contact Form with PayPal <= 1.3.52 - Cross-Site Request Forgery

Jan 29, 2025 Patched in 1.3.53 (1d)
CVE-2023-27460medium · 4.3Missing Authorization

CP Contact Form with Paypal <= 1.3.34 - Authenticated Feedback Submission

Mar 1, 2023 Patched in 1.3.35 (328d)
CVE-2019-14784medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CP Contact Form with PayPal <= 1.3.01 - Cross-Site Scripting

Jun 23, 2019 Patched in 1.3.02 (1675d)
CVE-2019-14785medium · 5.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CP Contact Form with PayPal <= 1.3.01 - Cross-Site Scripting

Jun 23, 2019 Patched in 1.3.02 (1675d)
CVE-2015-9233high · 8.8Cross-Site Request Forgery (CSRF)

CP Contact Form with PayPal < 1.1.6 - Cross-Site Request Forgery

Jul 9, 2015 Patched in 1.1.6 (3120d)
CVE-2015-9234high · 7.2Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

CP Contact Form with PayPal < 1.1.6 - SQL Injection

Jul 9, 2015 Patched in 1.1.6 (3120d)
Code Analysis
Analyzed Mar 16, 2026

CP Contact Form with PayPal Code Analysis

Dangerous Functions
6
Raw SQL Queries
23
25 prepared
Unescaped Output
41
525 escaped
Nonce Checks
7
Capability Checks
5
File Operations
0
External Requests
4
Bundled Libraries
1

Dangerous Functions Found

unserialize$params = unserialize($event[0]->posted_data);cp_contactformpp_admin_int_message_list.inc.php:30
unserialize$posted_data = unserialize($events[$i]->posted_data);cp_contactformpp_admin_int_message_list.inc.php:226
unserialize$params = unserialize($myrows[0]->posted_data);cp_contactformpp_functions.php:970
unserialize$params = unserialize($myrows[0]->posted_data);cp_contactformpp_functions.php:994
unserialize$data = unserialize($item->posted_data);cp_contactformpp_functions.php:1176
unserialize$data = unserialize($item->paypal_post);cp_contactformpp_functions.php:1178

Bundled Libraries

Select2

SQL Query Safety

52% prepared48 total queries

Output Escaping

93% escaped566 total outputs
Data Flows
6 unsanitized

Data Flow Analysis

12 flows6 with unsanitized paths
GetTransactionDetails (cp_paypal.express.php:169)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

CP Contact Form with PayPal Attack Surface

Entry Points4
Unprotected2

AJAX Handlers 3

authwp_ajax_cpcfwpp_feedbackcp-feedback.php:8
authwp_ajax_cpcfwpp_calculate_pricecp_contactformpp.php:113
noprivwp_ajax_cpcfwpp_calculate_pricecp_contactformpp.php:114

Shortcodes 1

[CP_CONTACT_FORM_PAYPAL] cp_contactformpp.php:154
WordPress Hooks 21
actionadmin_bar_menubanner.php:108
actionelementor/widgets/widgets_registeredcontrollers\elementor\cp-elementor-widget.inc.php:13
actionelementor/elements/categories_registeredcontrollers\elementor\cp-elementor-widget.inc.php:15
actionelementor/editor/after_enqueue_stylescontrollers\elementor\cp-elementor-widget.inc.php:17
actionelementor/frontend/after_enqueue_stylescontrollers\elementor\cp-elementor-widget.inc.php:19
actionadmin_enqueue_scriptscp-feedback.php:7
actionadmin_footercp-feedback.php:23
actioninitcp_contactformpp.php:107
actioninitcp_contactformpp.php:108
actionplugins_loadedcp_contactformpp.php:109
actionwp_loadedcp_contactformpp.php:110
actionmedia_buttonscp_contactformpp.php:131
actionadmin_enqueue_scriptscp_contactformpp.php:132
actionadmin_menucp_contactformpp.php:133
actionenqueue_block_editor_assetscp_contactformpp.php:134
filterlitespeed_cache_optimize_js_excludescp_contactformpp.php:177
filteroption_sbp_settingscp_contactformpp.php:184
actioninitcp_contactformpp.php:198
filterget_post_metadatacp_contactformpp.php:199
filtersgo_javascript_combine_excludecp_contactformpp.php:211
filtersgo_js_minify_excludecp_contactformpp.php:220
Maintenance & Trust

CP Contact Form with PayPal Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 12, 2026
PHP min version
Downloads285K

Community Trust

Rating76/100
Number of ratings65
Active installs900
Developer Profile

CP Contact Form with PayPal Developer Profile

codepeople

34 plugins · 89K total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
964 days
View full developer profile
Detection Fingerprints

How We Detect CP Contact Form with PayPal

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cp-contact-form-with-paypal/cp_contactformpp_styles.css/wp-content/plugins/cp-contact-form-with-paypal/cp_contactformpp_scripts.js
Script Paths
/wp-content/plugins/cp-contact-form-with-paypal/cp_contactformpp_scripts.js
Version Parameters
cp-contact-form-with-paypal/cp_contactformpp_styles.css?ver=cp-contact-form-with-paypal/cp_contactformpp_scripts.js?ver=

HTML / DOM Fingerprints

CSS Classes
cp-cfpp-container
HTML Comments
<!--START: activation redirection --><!--END: activation redirection --><!-- START: AJAX FORMS HANDLER --><!-- END: AJAX FORMS HANDLER -->+8 more
Data Attributes
data-plugin-name="CP Contact Form with PayPal"
JS Globals
cp_contact_form_paypal_admin_scriptsCP_CFPP_ADDONS_PAGE_URLCP_CFPP_DEMO_PAGE_URLCP_CFPP_FORMS_PAGE_URLCP_CFPP_AJAX_URLCP_CFPP_WEBSITE_URL+1 more
REST Endpoints
/wp-json/cpcfwpp/v1/get-form-data
Shortcode Output
[CP_CONTACT_FORM_PAYPAL]
FAQ

Frequently Asked Questions about CP Contact Form with PayPal