
Dynamic Text Field For Contact Form 7 Security & Risk Analysis
wordpress.org/plugins/dynamic-text-field-for-contact-form-7Add Fields Dynamically Contact Form 7 With it you can access a lot of post information e.g. title, slug, URL, ID, and even custom fields with shortco …
Is Dynamic Text Field For Contact Form 7 Safe to Use in 2026?
Generally Safe
Score 99/100Dynamic Text Field For Contact Form 7 has a strong security track record. Known vulnerabilities have been patched promptly.
The plugin 'dynamic-text-field-for-contact-form-7' version 1.0 presents a mixed security posture. Static analysis shows good practices in several areas, including no dangerous functions, no file operations, no external HTTP requests, and 100% of SQL queries utilizing prepared statements. Furthermore, output escaping is generally well-handled with 92% of outputs properly escaped, and there are no identified taint flows with unsanitized paths. This indicates a conscientious approach to preventing common vulnerabilities.
However, there are notable areas of concern. The plugin has a history of one known CVE, specifically a Cross-site Scripting (XSS) vulnerability, which is concerning despite being currently patched. The static analysis reveals a complete absence of nonce checks and capability checks across all entry points, which are critical for preventing unauthorized actions and ensuring that only legitimate users can trigger certain plugin functionalities. While the attack surface is limited to shortcodes, the lack of these security mechanisms on these entry points represents a significant weakness.
In conclusion, while the plugin demonstrates strengths in secure coding practices like prepared statements and output escaping, the lack of nonce and capability checks on its shortcode entry points is a significant oversight. The past XSS vulnerability, though patched, highlights a historical weakness that warrants careful monitoring. The absence of these fundamental security checks means that the plugin's core functionality is potentially vulnerable to attacks that could exploit its entry points.
Key Concerns
- No nonce checks on entry points
- No capability checks on entry points
- Past XSS vulnerability (though patched)
- Minor unescaped output instances
Dynamic Text Field For Contact Form 7 Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Dynamic Text Field For Contact Form 7 <= 2.0.22 - Authenticated (Contributor+) Stored Cross-Site Scripting
Dynamic Text Field For Contact Form 7 Code Analysis
Output Escaping
Dynamic Text Field For Contact Form 7 Attack Surface
Shortcodes 6
WordPress Hooks 10
Maintenance & Trust
Dynamic Text Field For Contact Form 7 Maintenance & Trust
Maintenance Signals
Community Trust
Dynamic Text Field For Contact Form 7 Alternatives
No alternatives data available yet.
Dynamic Text Field For Contact Form 7 Developer Profile
21 plugins · 12K total installs
How We Detect Dynamic Text Field For Contact Form 7
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/dynamic-text-field-for-contact-form-7/main/backend/DYFCF7_frontend.php/wp-content/plugins/dynamic-text-field-for-contact-form-7/main/resources/DYFCF7-installation-require.php/wp-content/plugins/dynamic-text-field-for-contact-form-7/main/resources/DYFCF7-language.phpHTML / DOM Fingerprints
wpcf7-validates-as-shortcodefielddata-tag-partdata-tag-option[DYFCF7_get_post_title][DYFCF7_get_current_user][DYFCF7_get_custom_field][DYFCF7_page_url]