DM Contact Form 7 DB Security & Risk Analysis

wordpress.org/plugins/dm-contact-form-7-db

Save Contact Form 7 entries.

300 active installs v1.0.2 PHP 7.0+ WP 5.0+ Updated Jan 22, 2026
cf7codeandcorecontact-form-7contact-form-7-dbsave-form
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is DM Contact Form 7 DB Safe to Use in 2026?

Generally Safe

Score 100/100

DM Contact Form 7 DB has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "dm-contact-form-7-db" plugin version 1.0.2 exhibits a mixed security posture. On the positive side, there are no recorded vulnerabilities (CVEs) and the plugin doesn't appear to have a large attack surface through common entry points like AJAX handlers, REST API routes, or shortcodes. Furthermore, a high percentage of output is properly escaped, indicating an effort to prevent basic cross-site scripting (XSS) issues.

However, significant concerns arise from the static code analysis. The presence of the `unserialize` function is a major red flag, as it can be exploited for object injection vulnerabilities if not handled with extreme care and validation. The fact that all 17 SQL queries are not using prepared statements is another critical weakness, making the plugin highly susceptible to SQL injection attacks. The taint analysis also revealed one flow with an unsanitized path, which could potentially lead to further security issues. The lack of capability checks for any entry points is concerning, as it suggests that even if entry points existed, they might not be adequately protected against unauthorized access.

Given the absence of known historical vulnerabilities, it's difficult to draw firm conclusions about past security practices. However, the current code analysis reveals fundamental security oversights that could lead to severe vulnerabilities. The plugin's strengths lie in its limited attack surface and good output escaping, but these are heavily overshadowed by the risks associated with `unserialize`, raw SQL queries, and the lack of capability checks.

Key Concerns

  • Unsanitized SQL queries
  • Dangerous function: unserialize
  • Flows with unsanitized paths
  • No capability checks
Vulnerabilities
None known

DM Contact Form 7 DB Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

DM Contact Form 7 DB Code Analysis

Dangerous Functions
8
Raw SQL Queries
17
0 prepared
Unescaped Output
8
35 escaped
Nonce Checks
3
Capability Checks
0
File Operations
5
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize<?php $form_data = unserialize( $results[0]->form_value );inc\admin-record-details.php:62
unserialize$first_row = isset($results[0]) ? unserialize( $results[0]->form_value ): 0 ;inc\admin-records-page.php:138
unserialize$form_value = unserialize( $result->form_value );inc\admin-records-page.php:248
unserialize$result_values = unserialize($result_value);inc\admin-records-page.php:324
unserialize$result_values = unserialize( $result_value );inc\admin-records-page.php:354
unserialize$result_values = unserialize( $result_value );inc\admin-records-page.php:370
unserialize$heading_row = unserialize( $heading_row->form_value );inc\export.php:101
unserialize$resultTmp = unserialize( $result->form_value );inc\export.php:127

SQL Query Safety

0% prepared17 total queries

Output Escaping

81% escaped43 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
bulk_actions (inc\admin-records-page.php:430)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

DM Contact Form 7 DB Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menuinc\admin-menu-page.php:24
actionadmin_enqueue_scriptsinc\script-enquer.php:37
actionplugins_loadedwp-cf7db.php:57
actioninitwp-cf7db.php:130
actionadmin_initwp-cf7db.php:131
filterplugin_row_metawp-cf7db.php:132
actionwpcf7_before_send_mailwp-cf7db.php:134
Maintenance & Trust

DM Contact Form 7 DB Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 22, 2026
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs300
Developer Profile

DM Contact Form 7 DB Developer Profile

The Code&Core Team

1 plugin · 300 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect DM Contact Form 7 DB

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dm-contact-form-7-db/assets/css/style.css/wp-content/plugins/dm-contact-form-7-db/assets/js/scripts.js
Script Paths
/wp-content/plugins/dm-contact-form-7-db/assets/js/scripts.js
Version Parameters
wp_cf7db/assets/css/style.css?ver=wp_cf7db/assets/js/scripts.js?ver=

HTML / DOM Fingerprints

JS Globals
WP_CF7DB_Ajax_Obj
FAQ

Frequently Asked Questions about DM Contact Form 7 DB