Forms: 3rd-Party Integration Security & Risk Analysis

wordpress.org/plugins/forms-3rdparty-integration

Send contact form submissions from other plugins to multiple external services e.g. CRM. Configurable, custom field mapping, pre/post processing.

5K active installs v1.8 PHP + WP 3.0+ Updated Sep 9, 2019
cf7contact-formcontact-form-7formgravity-forms
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Forms: 3rd-Party Integration Safe to Use in 2026?

Generally Safe

Score 85/100

Forms: 3rd-Party Integration has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "forms-3rdparty-integration" plugin, version 1.8, presents a mixed security posture. On the positive side, it demonstrates good practices in several areas. There are no known CVEs, indicating a generally stable history. The plugin also exclusively uses prepared statements for its SQL queries, which is excellent. The attack surface, as measured by AJAX handlers, REST API routes, shortcodes, and cron events, is remarkably small and appears to be entirely protected. Furthermore, the taint analysis found no unsanitized paths, suggesting a good effort in preventing direct injection vulnerabilities.

However, several concerning signals emerge from the static analysis. The presence of the `unserialize` function without clear context or associated sanitization logic is a significant red flag. This function is notoriously dangerous when used with untrusted input, as it can lead to object injection vulnerabilities. The low percentage of properly escaped output (27%) is also a substantial concern, as it increases the risk of Cross-Site Scripting (XSS) vulnerabilities, especially if data processed by the plugin is later displayed to users without adequate sanitization.

While the vulnerability history is clean, this does not negate the risks identified in the code. The lack of capability checks is another weakness, potentially allowing unauthorized users to perform actions they shouldn't. The plugin's reliance on external HTTP requests also introduces potential supply chain risks if the external services are compromised or behave maliciously. In conclusion, while the plugin has a clean vulnerability history and a small, protected attack surface, the identified code signals like `unserialize` usage and poor output escaping warrant significant attention and mitigation efforts.

Key Concerns

  • Dangerous function unserialize used
  • Low percentage of output properly escaped
  • No capability checks found
  • File operations present
  • External HTTP requests present
Vulnerabilities
None known

Forms: 3rd-Party Integration Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Forms: 3rd-Party Integration Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
103
39 escaped
Nonce Checks
1
Capability Checks
0
File Operations
1
External Requests
2
Bundled Libraries
0

Dangerous Functions Found

unserialize$data = unserialize($response);3rd-parties\multitouch\functions.multitouch.php:27

Output Escaping

27% escaped142 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<plugin-ui> (plugin-ui.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Forms: 3rd-Party Integration Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
filterCf73rdPartyIntegration_service_filter_post_33rd-parties\listrak\functions.listrak.php:20
filterCf73rdPartyIntegration_service_filter_post_43rd-parties\listrak\functions.listrak.php:29
actionForms3rdpartyIntegrationIntegration_service_a53rd-parties\mailchimp\functions.mailchimp.php:17
actionForms3rdpartyIntegrationIntegration_service_a03rd-parties\multitouch\functions.multitouch.php:14
filterForms3rdpartyIntegrationIntegration_service_filter_post_03rd-parties\multitouch\functions.multitouch.php:16
actionadmin_menuforms-3rdparty-integration.php:125
actioninitforms-3rdparty-integration.php:126
filterplugin_action_linksforms-3rdparty-integration.php:139
filtergform_confirmationplugins\gravityforms.php:182
filtergform_confirmationplugins\gravityforms.php:212
actionadmin_initupgrade.php:8
Maintenance & Trust

Forms: 3rd-Party Integration Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedSep 9, 2019
PHP min version
Downloads122K

Community Trust

Rating98/100
Number of ratings31
Active installs5K
Developer Profile

Forms: 3rd-Party Integration Developer Profile

zaus

13 plugins · 5K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Forms: 3rd-Party Integration

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/forms-3rdparty-integration/admin.css/wp-content/plugins/forms-3rdparty-integration/admin.js/wp-content/plugins/forms-3rdparty-integration/js/admin.js/wp-content/plugins/forms-3rdparty-integration/js/forms-3rdparty-integration-admin.js/wp-content/plugins/forms-3rdparty-integration/js/service_edit.js/wp-content/plugins/forms-3rdparty-integration/js/forms-3rdparty-integration-service-edit.js
Script Paths
/wp-content/plugins/forms-3rdparty-integration/admin.js/wp-content/plugins/forms-3rdparty-integration/js/admin.js/wp-content/plugins/forms-3rdparty-integration/js/forms-3rdparty-integration-admin.js/wp-content/plugins/forms-3rdparty-integration/js/service_edit.js/wp-content/plugins/forms-3rdparty-integration/js/forms-3rdparty-integration-service-edit.js
Version Parameters
forms-3rdparty-integration/admin.css?ver=forms-3rdparty-integration/admin.js?ver=forms-3rdparty-integration/js/admin.js?ver=forms-3rdparty-integration/js/forms-3rdparty-integration-admin.js?ver=forms-3rdparty-integration/js/service_edit.js?ver=forms-3rdparty-integration/js/forms-3rdparty-integration-service-edit.js?ver=

HTML / DOM Fingerprints

CSS Classes
f3i-service-editf3i-debug-log
HTML Comments
<!-- copied from forms-3rdparty-integration/upgrade.php --><!-- include admin.css --><!-- include admin.js --><!-- include scripts for the service_edit.php page -->+1 more
Data Attributes
data-service-urldata-service-iddata-service-namedata-form-iddata-mapping-source-inputdata-mapping-source-type+2 more
JS Globals
f3i_service_editf3i_admin_debug
FAQ

Frequently Asked Questions about Forms: 3rd-Party Integration