
Forms: 3rd-Party Xml Post Security & Risk Analysis
wordpress.org/plugins/forms-3rd-party-xpostConverts submission from Forms 3rdparty Integration to xml/json, add headers, or nest fields.
Is Forms: 3rd-Party Xml Post Safe to Use in 2026?
Generally Safe
Score 85/100Forms: 3rd-Party Xml Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin "forms-3rd-party-xpost" v1.4.3 exhibits a generally good security posture based on the provided static analysis. The absence of dangerous functions, SQL injection vulnerabilities (as all queries are prepared), file operations, and external HTTP requests is a strong positive indicator. Furthermore, the lack of any recorded CVEs, past or present, suggests a history of secure development or diligent patching by users. The total entry points are low, and importantly, none are found to be unprotected without authentication checks.
However, there are areas for concern. The most significant weakness lies in the output escaping, where only 12% of 34 outputs are properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is directly outputted without proper sanitization. The complete absence of taint analysis results (0 flows analyzed) makes it impossible to confirm if any sensitive data flows could be exploited, though the absence of reported vulnerabilities is reassuring. The lack of nonce checks, while not directly exposed by the entry points, could be a weakness if new AJAX or other interactive endpoints are added in the future without proper security considerations.
In conclusion, while the plugin demonstrates strengths in areas like SQL security and vulnerability history, the poor output escaping is a notable risk that needs immediate attention. The lack of taint analysis leaves a gap in understanding potential data flow vulnerabilities. The plugin is relatively secure from common web exploits as presented, but the XSS risk is a tangible concern.
Key Concerns
- Low percentage of properly escaped output
- No taint analysis performed
- No nonce checks implemented
Forms: 3rd-Party Xml Post Security Vulnerabilities
Forms: 3rd-Party Xml Post Release Timeline
Forms: 3rd-Party Xml Post Code Analysis
Output Escaping
Forms: 3rd-Party Xml Post Attack Surface
Shortcodes 2
Maintenance & Trust
Forms: 3rd-Party Xml Post Maintenance & Trust
Maintenance Signals
Community Trust
Forms: 3rd-Party Xml Post Alternatives
Forms: 3rd-Party Integration
forms-3rdparty-integration
Send contact form submissions from other plugins to multiple external services e.g. CRM. Configurable, custom field mapping, pre/post processing.
Autopreenchimento de endereço em formulários
cf7-cep-autofill
Preenchimento automático de campos de endereço baseado no CEP informado.
Forms: 3rd-Party Dynamic Fields
forms-3rdparty-dynamic-fields
Using pre-configured placeholders like ##UID##, ##REFERER##, or ##SITEURL##, add dynamic fields to the normally map-only or static-only Forms: 3rdpart …
Forms: 3rd-Party Migration
forms-3rdparty-migrate
To upgrade deprecated Wordpress Plugin CF7-3rdparty Integration to the new version Forms 3rdparty Integration, or migrate settings of either plugin be …
Forms: 3rd-Party File Attachments
forms-3rdparty-files
Add file upload processing to Forms 3rdparty Integration.
Forms: 3rd-Party Xml Post Developer Profile
13 plugins · 5K total installs
How We Detect Forms: 3rd-Party Xml Post
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
[base64][/base64][xpost-loop][/xpost-loop]