
Filled In Security & Risk Analysis
wordpress.org/plugins/filled-inGeneric form processor allowing forms to be painlessly processed and aggregated, with numerous options to validate data and perform custom commands
Is Filled In Safe to Use in 2026?
Generally Safe
Score 99/100Filled In has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.
The plugin "filled-in" v1.9.6 exhibits a mixed security posture. On the positive side, it demonstrates a strong adherence to output escaping best practices with 99% of outputs properly escaped and a good number of nonce and capability checks. The absence of external HTTP requests and bundled libraries further mitigates certain risk vectors. However, significant concerns arise from the static analysis. The presence of 45 dangerous functions, including 'assert' and 'unserialize', signals potential for serious vulnerabilities if not handled with extreme care. Furthermore, the taint analysis reveals 8 flows with unsanitized paths, two of which are critical and two are high severity, indicating a clear risk of data injection or manipulation. While there are no currently unpatched CVEs, the historical medium severity CSRF vulnerability, though past, suggests a potential weakness in handling user-initiated actions securely. The plugin's strengths lie in its output sanitization and authentication checks, but the identified dangerous functions and tainted flows represent critical areas requiring immediate attention and remediation.
Key Concerns
- Critical severity taint flows found
- High severity taint flows found
- High number of dangerous functions present
- Significant percentage of SQL queries not using prepared statements
- Flows with unsanitized paths
- Presence of unserialize function
- Presence of assert function
- Past medium severity vulnerability (CSRF)
Filled In Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Filled In <= 1.9.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting
Filled In Release Timeline
Filled In Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Filled In Attack Surface
WordPress Hooks 26
Scheduled Events 1
Maintenance & Trust
Filled In Maintenance & Trust
Maintenance Signals
Community Trust
Filled In Alternatives
Contact Form 7 – Blacklist Unwanted Email
block-email-cf7
This is a free add-on plugin for contact form 7, which validates the email field and restrict unwanted email submission as well as allowed only busine …
Integrate Contact Form 7 with TheChecker.co
integrate-cf7-thecheckerco
TheChecker.co integration for Contact Form 7
Contact Form 7
contact-form-7
Just another contact form plugin. Simple but flexible.
Akismet Anti-spam: Spam Protection
akismet
The best anti-spam protection to block spam comments and spam in a contact form. The most trusted antispam solution for WordPress and WooCommerce.
WPForms – Easy Form Builder for WordPress – Contact Forms, Payment Forms, Surveys, & More
wpforms-lite
The best WordPress contact form plugin. Drag & Drop form builder to create beautiful contact forms, payment forms, & other custom forms.
Filled In Developer Profile
19 plugins · 48K total installs
How We Detect Filled In
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/filled-in/controller/admin.css/wp-content/plugins/filled-in/controller/admin.js/wp-content/plugins/filled-in/controller/admin.jsfilled-in/controller/admin.js?ver=HTML / DOM Fingerprints
filled-in-formdata-filled-in-idfilled_in/wp-json/filled-in/v1/forms<form class="filled-in-form" id="fi-form-<input type="hidden" name="fi_nonce" value="<input type="hidden" name="fi_id" value="