
Forms: 3rdparty Phone Numbers Security & Risk Analysis
wordpress.org/plugins/forms-3rdparty-phone-numbersAn add-on to 'Forms: 3rdparty Integration', it parses phone number fields from Contact Form submissions and exposes them to additional mappi …
Is Forms: 3rdparty Phone Numbers Safe to Use in 2026?
Generally Safe
Score 85/100Forms: 3rdparty Phone Numbers has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin 'forms-3rdparty-phone-numbers' v0.4.3 exhibits a seemingly robust security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code signals show no dangerous functions, no raw SQL queries (all use prepared statements), no file operations, and no external HTTP requests. The lack of critical or high severity taint flows further contributes to this positive assessment. The plugin also has no recorded vulnerability history, suggesting a stable and secure development past.
However, there are areas for concern. The low percentage of properly escaped output (10%) is a significant weakness. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected and executed within the context of a user's browser if the output is not properly sanitized. The complete absence of nonce checks and capability checks across all entry points (which are none in this case) is noted, but the lack of entry points mitigates the immediate risk. The lack of a comprehensive taint analysis (0 flows analyzed) means potential vulnerabilities in complex data processing might have been missed.
In conclusion, while the plugin currently demonstrates a clean bill of health with no known CVEs and a minimal attack surface, the poor output escaping practices present a considerable risk. The development team should prioritize addressing the insufficient output escaping to prevent potential XSS vulnerabilities. Further, a more thorough taint analysis might be beneficial to ensure no subtle vulnerabilities are overlooked.
Key Concerns
- Low percentage of properly escaped output
- No taint flow analysis performed
Forms: 3rdparty Phone Numbers Security Vulnerabilities
Forms: 3rdparty Phone Numbers Code Analysis
Output Escaping
Forms: 3rdparty Phone Numbers Attack Surface
Maintenance & Trust
Forms: 3rdparty Phone Numbers Maintenance & Trust
Maintenance Signals
Community Trust
Forms: 3rdparty Phone Numbers Alternatives
CF7 to Webhook
cf7-to-zapier
Use Contact Form 7 as a trigger to any webhook!
Contact Form to Any API
contact-form-to-any-api
Send Contact Form 7 submissions to any API, Webhook or CRM - quick setup, flexible payloads, endpoints and authentication.
Contact Form 7 Connector
ari-cf7-connector
MailChimp, MailerLite and Zapier integration with Contact Form 7. Use form data smartly. Generate unlimited leads and extend mailing lists.
Country Code Selector
country-code-selector
Country Code Selector uses a JavaScript base to allow customers checking out in WooCommerce, Shopp eCommerce, Contact form 7, Gravity form plugins sel …
Contact Forms by Cimatti
contact-forms
Create and publish forms in your WordPress website with drag and drop. Contact forms, landing page forms, invitations, and more.
Forms: 3rdparty Phone Numbers Developer Profile
13 plugins · 5K total installs
How We Detect Forms: 3rdparty Phone Numbers
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/forms-3rdparty-phone-numbers/f3i-phonenumber.phpforms-3rdparty-phone-numbers/f3i-phonenumber.php?ver=HTML / DOM Fingerprints
<!-- _log(__CLASS__, $phoneFields, $submission) --><!-- _log('before parse', $field, $phonenumber, $format, $outformat) --><!-- _log('parsed proto', $field, $format, $outformat, $proto) --><!-- _log($phonenumber, $format, $outformat, $parts) -->+2 morename="forms3rdpartyintegration[value="field_name=(%s) %s"