
Forms: 3rd-Party Dynamic Fields Security & Risk Analysis
wordpress.org/plugins/forms-3rdparty-dynamic-fieldsUsing pre-configured placeholders like ##UID##, ##REFERER##, or ##SITEURL##, add dynamic fields to the normally map-only or static-only Forms: 3rdpart …
Is Forms: 3rd-Party Dynamic Fields Safe to Use in 2026?
Generally Safe
Score 85/100Forms: 3rd-Party Dynamic Fields has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The static analysis of forms-3rdparty-dynamic-fields v0.7.3 indicates a generally positive security posture. The plugin boasts a clean attack surface with no reported AJAX handlers, REST API routes, shortcodes, or cron events, meaning there are no apparent entry points for external interaction. Furthermore, the absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests are all strong indicators of secure coding practices. The fact that 100% of SQL queries use prepared statements is a significant strength.
However, a notable concern arises from the low percentage (4%) of properly escaped outputs. With 53 total outputs analyzed, this suggests a substantial number of them are not being properly sanitized, potentially exposing the application to Cross-Site Scripting (XSS) vulnerabilities. The lack of nonce and capability checks, while potentially explained by the limited attack surface, could still represent a risk if any unforeseen entry points are discovered or if the plugin's functionality evolves without these security measures.
The plugin's vulnerability history is completely clean, with no known CVEs, which is an excellent sign. This lack of past vulnerabilities, combined with the current static analysis findings (except for output escaping), suggests a development team that is likely aware of and implements good security practices. The primary risk lies in the unescaped output, which requires immediate attention to prevent potential XSS attacks. The absence of other common security pitfalls is commendable.
Key Concerns
- Low percentage of properly escaped output
- No nonce checks
- No capability checks
Forms: 3rd-Party Dynamic Fields Security Vulnerabilities
Forms: 3rd-Party Dynamic Fields Code Analysis
Output Escaping
Forms: 3rd-Party Dynamic Fields Attack Surface
Maintenance & Trust
Forms: 3rd-Party Dynamic Fields Maintenance & Trust
Maintenance Signals
Community Trust
Forms: 3rd-Party Dynamic Fields Alternatives
Forms: 3rd-Party Integration
forms-3rdparty-integration
Send contact form submissions from other plugins to multiple external services e.g. CRM. Configurable, custom field mapping, pre/post processing.
Autopreenchimento de endereço em formulários
cf7-cep-autofill
Preenchimento automático de campos de endereço baseado no CEP informado.
Forms: 3rd-Party Xml Post
forms-3rd-party-xpost
Converts submission from Forms 3rdparty Integration to xml/json, add headers, or nest fields.
Forms: 3rd-Party Migration
forms-3rdparty-migrate
To upgrade deprecated Wordpress Plugin CF7-3rdparty Integration to the new version Forms 3rdparty Integration, or migrate settings of either plugin be …
Forms: 3rd-Party File Attachments
forms-3rdparty-files
Add file upload processing to Forms 3rdparty Integration.
Forms: 3rd-Party Dynamic Fields Developer Profile
13 plugins · 5K total installs
How We Detect Forms: 3rd-Party Dynamic Fields
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.