GravityForms SalesForce Add-On Security & Risk Analysis

wordpress.org/plugins/gf-add-on-salesforce

Easily integrate Salesforce with your Gravity Forms.

10 active installs v2.0 PHP + WP 4.0+ Updated Jan 15, 2018
formsgravity-formssalesforce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is GravityForms SalesForce Add-On Safe to Use in 2026?

Generally Safe

Score 85/100

GravityForms SalesForce Add-On has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The static analysis of "gf-add-on-salesforce" v2.0 reveals a generally strong security posture. The plugin reports zero AJAX handlers, REST API routes, shortcodes, or cron events that could serve as direct entry points into the application. Furthermore, the code demonstrates excellent practices with no dangerous functions, no raw SQL queries, and all output being properly escaped. The absence of file operations and a clean taint analysis also suggest a low risk of common code injection or manipulation vulnerabilities.

However, there are some areas that warrant attention. The plugin makes three external HTTP requests, which, while not inherently insecure, represent potential attack vectors if the remote endpoints are compromised or if sensitive data is transmitted without proper encryption. The complete lack of nonce checks and capability checks across all identified entry points (even if none are explicitly listed as unprotected) is a significant concern. This suggests that any hypothetical, future addition of handlers or routes, or even an oversight in the current static analysis reporting, could expose critical functionality to unauthorized access or manipulation.

The plugin's vulnerability history is pristine, with zero recorded CVEs. This is a very positive indicator of past security diligence. However, it's important to remember that a lack of historical vulnerabilities does not guarantee future immunity, especially when combined with the identified concerns regarding external requests and the absence of robust access control mechanisms like nonces and capability checks.

Key Concerns

  • External HTTP requests present potential risk
  • Lack of nonce checks
  • Lack of capability checks
Vulnerabilities
None known

GravityForms SalesForce Add-On Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

GravityForms SalesForce Add-On Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

GravityForms SalesForce Add-On Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actiongform_loadedsalesforce.php:13
Maintenance & Trust

GravityForms SalesForce Add-On Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJan 15, 2018
PHP min version
Downloads1K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

GravityForms SalesForce Add-On Developer Profile

Gravity Extra

4 plugins · 1K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GravityForms SalesForce Add-On

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gf-add-on-salesforce/gravity-forms-salesforce-add-on.php/wp-content/plugins/gf-add-on-salesforce/gravity-forms-salesforce-add-on.php
Version Parameters
gf-add-on-salesforcegravity-forms-salesforce-add-on

HTML / DOM Fingerprints

CSS Classes
gf_keystatus_valid_textgf_keystatus_validgf_keystatus_invalid_textgf_keystatus_invalid
HTML Comments
////
Data Attributes
data-input type="password"
FAQ

Frequently Asked Questions about GravityForms SalesForce Add-On