Database for CF7 Security & Risk Analysis

wordpress.org/plugins/database-for-cf7

Save CF7 submitted form informations into your WordPress database.

2K active installs v1.2.6 PHP + WP 4.6+ Updated Oct 29, 2024
cf7cf7-databasecontact-form-7databasesave-contact-form
92
A · Safe
CVEs total1
Unpatched0
Last CVENov 29, 2023
Safety Verdict

Is Database for CF7 Safe to Use in 2026?

Generally Safe

Score 92/100

Database for CF7 has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Nov 29, 2023Updated 1yr ago
Risk Assessment

The "database-for-cf7" plugin v1.2.6 exhibits a mixed security posture. While it demonstrates good practices in areas like prepared statement usage for SQL queries and a high percentage of properly escaped output, significant concerns remain. The presence of a dangerous function like `unserialize` combined with an unprotected AJAX handler presents a notable risk. Although taint analysis shows no critical or high severity unsanitized paths, the potential for `unserialize` to be exploited if data is not properly validated before being processed is a serious threat, especially when coupled with an accessible entry point.

The vulnerability history shows one medium severity CVE related to Missing Authorization, which aligns with the identified unprotected AJAX handler. The fact that this vulnerability is no longer unpatched is positive, but the pattern of authorization issues suggests ongoing diligence is required. The plugin's strengths lie in its robust SQL querying and output escaping, but the single unprotected AJAX endpoint and the `unserialize` function create a clear attack vector that could be exploited to execute arbitrary code or lead to data leakage if not mitigated.

In conclusion, while "database-for-cf7" has made efforts in secure coding for database interactions and output handling, the critical vulnerability of an unprotected AJAX handler coupled with the dangerous `unserialize` function poses a significant risk. The historical medium vulnerability also points to a recurring theme of authorization weaknesses. Administrators should be aware of these potential entry points for exploitation.

Key Concerns

  • AJAX handler without authentication check
  • Use of dangerous function (unserialize)
  • Missing authorization vulnerability history
Vulnerabilities
1

Database for CF7 Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2023-49167medium · 6.5Missing Authorization

Database for CF7 <= 1.2.4 - Missing Authorization via wpcf7db_delete AJAX action

Nov 29, 2023 Patched in 1.2.5 (101d)
Code Analysis
Analyzed Mar 16, 2026

Database for CF7 Code Analysis

Dangerous Functions
1
Raw SQL Queries
2
8 prepared
Unescaped Output
3
20 escaped
Nonce Checks
4
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

unserialize<?php foreach ( unserialize( $row->data ) as $field ) : ?>database-for-cf7.php:235

Bundled Libraries

DataTables

SQL Query Safety

80% prepared10 total queries

Output Escaping

87% escaped23 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<database-for-cf7> (database-for-cf7.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Database for CF7 Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_wpcf7db_deletedatabase-for-cf7.php:260
WordPress Hooks 8
actioninitdatabase-for-cf7.php:51
actionbefore_woocommerce_initdatabase-for-cf7.php:56
actionadmin_enqueue_scriptsdatabase-for-cf7.php:70
actionadmin_noticesdatabase-for-cf7.php:101
actionwpcf7_mail_sentdatabase-for-cf7.php:108
actionadmin_menudatabase-for-cf7.php:136
actionwpcf7_tabledatabase-for-cf7.php:195
actionwp_dashboard_setupdatabase-for-cf7.php:285
Maintenance & Trust

Database for CF7 Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedOct 29, 2024
PHP min version
Downloads29K

Community Trust

Rating88/100
Number of ratings7
Active installs2K
Developer Profile

Database for CF7 Developer Profile

code4life

3 plugins · 8K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
101 days
View full developer profile
Detection Fingerprints

How We Detect Database for CF7

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/database-for-cf7/resources/css/wpcf7db.css/wp-content/plugins/database-for-cf7/resources/css/wpcf7db.min.css/wp-content/plugins/database-for-cf7/resources/js/wpcf7db.js/wp-content/plugins/database-for-cf7/resources/js/wpcf7db.min.js/wp-content/plugins/database-for-cf7/libs/datatables/css/jquery.dataTables.min.css/wp-content/plugins/database-for-cf7/libs/datatables/css/buttons.dataTables.min.css/wp-content/plugins/database-for-cf7/libs/datatables/js/jquery.dataTables.min.js/wp-content/plugins/database-for-cf7/libs/datatables/js/dataTables.buttons.min.js+7 more
Script Paths
/wp-content/plugins/database-for-cf7/resources/js/wpcf7db.js/wp-content/plugins/database-for-cf7/resources/js/wpcf7db.min.js
Version Parameters
database-for-cf7/resources/css/wpcf7db.css?ver=database-for-cf7/resources/js/wpcf7db.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpcf7db-table
Data Attributes
data-nonce
JS Globals
parameters
FAQ

Frequently Asked Questions about Database for CF7