
Forms: 3rd-Party Integration Security & Risk Analysis
wordpress.org/plugins/forms-3rdparty-integrationSend contact form submissions from other plugins to multiple external services e.g. CRM. Configurable, custom field mapping, pre/post processing.
Is Forms: 3rd-Party Integration Safe to Use in 2026?
Generally Safe
Score 85/100Forms: 3rd-Party Integration has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "forms-3rdparty-integration" plugin, version 1.8, presents a mixed security posture. On the positive side, it demonstrates good practices in several areas. There are no known CVEs, indicating a generally stable history. The plugin also exclusively uses prepared statements for its SQL queries, which is excellent. The attack surface, as measured by AJAX handlers, REST API routes, shortcodes, and cron events, is remarkably small and appears to be entirely protected. Furthermore, the taint analysis found no unsanitized paths, suggesting a good effort in preventing direct injection vulnerabilities.
However, several concerning signals emerge from the static analysis. The presence of the `unserialize` function without clear context or associated sanitization logic is a significant red flag. This function is notoriously dangerous when used with untrusted input, as it can lead to object injection vulnerabilities. The low percentage of properly escaped output (27%) is also a substantial concern, as it increases the risk of Cross-Site Scripting (XSS) vulnerabilities, especially if data processed by the plugin is later displayed to users without adequate sanitization.
While the vulnerability history is clean, this does not negate the risks identified in the code. The lack of capability checks is another weakness, potentially allowing unauthorized users to perform actions they shouldn't. The plugin's reliance on external HTTP requests also introduces potential supply chain risks if the external services are compromised or behave maliciously. In conclusion, while the plugin has a clean vulnerability history and a small, protected attack surface, the identified code signals like `unserialize` usage and poor output escaping warrant significant attention and mitigation efforts.
Key Concerns
- Dangerous function unserialize used
- Low percentage of output properly escaped
- No capability checks found
- File operations present
- External HTTP requests present
Forms: 3rd-Party Integration Security Vulnerabilities
Forms: 3rd-Party Integration Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Forms: 3rd-Party Integration Attack Surface
WordPress Hooks 11
Maintenance & Trust
Forms: 3rd-Party Integration Maintenance & Trust
Maintenance Signals
Community Trust
Forms: 3rd-Party Integration Alternatives
Autopreenchimento de endereço em formulários
cf7-cep-autofill
Preenchimento automático de campos de endereço baseado no CEP informado.
Forms: 3rd-Party Xml Post
forms-3rd-party-xpost
Converts submission from Forms 3rdparty Integration to xml/json, add headers, or nest fields.
Forms: 3rd-Party Dynamic Fields
forms-3rdparty-dynamic-fields
Using pre-configured placeholders like ##UID##, ##REFERER##, or ##SITEURL##, add dynamic fields to the normally map-only or static-only Forms: 3rdpart …
Forms: 3rd-Party Migration
forms-3rdparty-migrate
To upgrade deprecated Wordpress Plugin CF7-3rdparty Integration to the new version Forms 3rdparty Integration, or migrate settings of either plugin be …
Forms: 3rd-Party File Attachments
forms-3rdparty-files
Add file upload processing to Forms 3rdparty Integration.
Forms: 3rd-Party Integration Developer Profile
13 plugins · 5K total installs
How We Detect Forms: 3rd-Party Integration
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/forms-3rdparty-integration/admin.css/wp-content/plugins/forms-3rdparty-integration/admin.js/wp-content/plugins/forms-3rdparty-integration/js/admin.js/wp-content/plugins/forms-3rdparty-integration/js/forms-3rdparty-integration-admin.js/wp-content/plugins/forms-3rdparty-integration/js/service_edit.js/wp-content/plugins/forms-3rdparty-integration/js/forms-3rdparty-integration-service-edit.js/wp-content/plugins/forms-3rdparty-integration/admin.js/wp-content/plugins/forms-3rdparty-integration/js/admin.js/wp-content/plugins/forms-3rdparty-integration/js/forms-3rdparty-integration-admin.js/wp-content/plugins/forms-3rdparty-integration/js/service_edit.js/wp-content/plugins/forms-3rdparty-integration/js/forms-3rdparty-integration-service-edit.jsforms-3rdparty-integration/admin.css?ver=forms-3rdparty-integration/admin.js?ver=forms-3rdparty-integration/js/admin.js?ver=forms-3rdparty-integration/js/forms-3rdparty-integration-admin.js?ver=forms-3rdparty-integration/js/service_edit.js?ver=forms-3rdparty-integration/js/forms-3rdparty-integration-service-edit.js?ver=HTML / DOM Fingerprints
f3i-service-editf3i-debug-log<!-- copied from forms-3rdparty-integration/upgrade.php --><!-- include admin.css --><!-- include admin.js --><!-- include scripts for the service_edit.php page -->+1 moredata-service-urldata-service-iddata-service-namedata-form-iddata-mapping-source-inputdata-mapping-source-type+2 moref3i_service_editf3i_admin_debug