Forms: 3rd-Party Submission Reformat Security & Risk Analysis

wordpress.org/plugins/forms-3rdparty-submission-reformat

Customize specific Forms-3rdparty submission fields' format.

0 active installs v0.2.2 PHP + WP 3.0+ Updated Jun 11, 2018
cf7contact-formcontact-form-7formgravity-forms
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Forms: 3rd-Party Submission Reformat Safe to Use in 2026?

Generally Safe

Score 85/100

Forms: 3rd-Party Submission Reformat has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "forms-3rdparty-submission-reformat" plugin, in version 0.2.2, presents a generally positive security posture based on the provided static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface, and importantly, all discovered entry points appear to be protected by authorization checks, which is a strong security practice. Furthermore, the code demonstrates a commitment to secure database interactions, with 100% of SQL queries utilizing prepared statements, and no file operations or external HTTP requests were detected, which are common vectors for vulnerabilities.

However, there are notable areas for improvement. The most significant concern is the low percentage of properly escaped output (22%). This suggests that user-supplied data or other dynamic content might be outputted without adequate sanitization, potentially leading to Cross-Site Scripting (XSS) vulnerabilities if an attacker can inject malicious scripts. The absence of nonce checks, while perhaps mitigated by the limited attack surface, is also a potential concern, as it represents a missed opportunity for robust protection against Cross-Site Request Forgery (CSRF) attacks. The lack of any recorded vulnerabilities in its history is a positive indicator, suggesting a well-maintained codebase or a lack of prior scrutiny. Despite the strong foundations in limiting attack vectors and secure SQL handling, the unescaped output remains a tangible risk that warrants immediate attention.

Key Concerns

  • Low percentage of properly escaped output
  • No nonce checks detected
Vulnerabilities
None known

Forms: 3rd-Party Submission Reformat Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Forms: 3rd-Party Submission Reformat Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

22% escaped9 total outputs
Attack Surface

Forms: 3rd-Party Submission Reformat Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuzaus-wp-options-base.php:31
actionadmin_initzaus-wp-options-base.php:32
filterplugin_action_linkszaus-wp-options-base.php:46
Maintenance & Trust

Forms: 3rd-Party Submission Reformat Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedJun 11, 2018
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Forms: 3rd-Party Submission Reformat Developer Profile

zaus

13 plugins · 5K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Forms: 3rd-Party Submission Reformat

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
forms-3rdparty-submission-reformat/style.css?ver=forms-3rdparty-submission-reformat/script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Forms: 3rd-Party Submission Reformat