Forms: 3rd-Party Xml Post Security & Risk Analysis

wordpress.org/plugins/forms-3rd-party-xpost

Converts submission from Forms 3rdparty Integration to xml/json, add headers, or nest fields.

100 active installs v1.4.3 PHP + WP 3.0+ Updated Jul 17, 2018
cf7contact-formcontact-form-7formgravity-forms
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Forms: 3rd-Party Xml Post Safe to Use in 2026?

Generally Safe

Score 85/100

Forms: 3rd-Party Xml Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The plugin "forms-3rd-party-xpost" v1.4.3 exhibits a generally good security posture based on the provided static analysis. The absence of dangerous functions, SQL injection vulnerabilities (as all queries are prepared), file operations, and external HTTP requests is a strong positive indicator. Furthermore, the lack of any recorded CVEs, past or present, suggests a history of secure development or diligent patching by users. The total entry points are low, and importantly, none are found to be unprotected without authentication checks.

However, there are areas for concern. The most significant weakness lies in the output escaping, where only 12% of 34 outputs are properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is directly outputted without proper sanitization. The complete absence of taint analysis results (0 flows analyzed) makes it impossible to confirm if any sensitive data flows could be exploited, though the absence of reported vulnerabilities is reassuring. The lack of nonce checks, while not directly exposed by the entry points, could be a weakness if new AJAX or other interactive endpoints are added in the future without proper security considerations.

In conclusion, while the plugin demonstrates strengths in areas like SQL security and vulnerability history, the poor output escaping is a notable risk that needs immediate attention. The lack of taint analysis leaves a gap in understanding potential data flow vulnerabilities. The plugin is relatively secure from common web exploits as presented, but the XSS risk is a tangible concern.

Key Concerns

  • Low percentage of properly escaped output
  • No taint analysis performed
  • No nonce checks implemented
Vulnerabilities
None known

Forms: 3rd-Party Xml Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Forms: 3rd-Party Xml Post Release Timeline

v1.4
v1.3
v1.0
v0.5
v0.4.3
v0.2
v0.1
Code Analysis
Analyzed Mar 16, 2026

Forms: 3rd-Party Xml Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
30
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

12% escaped34 total outputs
Attack Surface

Forms: 3rd-Party Xml Post Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[base64] forms-3rdparty-xpost.php:45
[xpost-loop] forms-3rdparty-xpost.php:46
Maintenance & Trust

Forms: 3rd-Party Xml Post Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJul 17, 2018
PHP min version
Downloads8K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

Forms: 3rd-Party Xml Post Developer Profile

zaus

13 plugins · 5K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Forms: 3rd-Party Xml Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[base64][/base64][xpost-loop][/xpost-loop]
FAQ

Frequently Asked Questions about Forms: 3rd-Party Xml Post