Integration of Caldera Forms and Paystack Security & Risk Analysis

wordpress.org/plugins/integration-of-caldera-forms-and-paystack

Caldera Forms Paystack Integration

10 active installs v1.0.0 PHP 5.6+ WP 4.0+ Updated Mar 4, 2021
caldera-paymentcaldera-paystackcaldera-paystack-addonsnigeriapaystack
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Integration of Caldera Forms and Paystack Safe to Use in 2026?

Generally Safe

Score 85/100

Integration of Caldera Forms and Paystack has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The static analysis of the "integration-of-caldera-forms-and-paystack" v1.0.0 plugin indicates a generally good security posture, with no identified attack surface, dangerous functions, or SQL injection vulnerabilities due to the use of prepared statements. The absence of taint analysis findings and a clean vulnerability history further bolster this positive assessment, suggesting the plugin has been developed with security in mind and has not historically been a target for exploits.

However, there are a few areas that warrant attention. The plugin has external HTTP requests, which, if not properly secured or validated, could potentially be exploited. Furthermore, only 50% of output is properly escaped, leaving the remaining half vulnerable to cross-site scripting (XSS) attacks if the data originates from an untrusted source. The lack of nonce and capability checks on any potential entry points (though none were identified in this analysis) is also a theoretical concern for future development or if features were added without proper security controls.

In conclusion, while the plugin exhibits several strong security practices and a clean history, the partially unescaped output and external HTTP request represent minor risks that should be addressed. The absence of a larger attack surface and known vulnerabilities is a significant strength, making this plugin appear relatively safe for use, provided the identified areas are remediated.

Key Concerns

  • Half of output not properly escaped
  • External HTTP request present
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

Integration of Caldera Forms and Paystack Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Integration of Caldera Forms and Paystack Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

50% escaped4 total outputs
Attack Surface

Integration of Caldera Forms and Paystack Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionplugins_loadedinc\class-icfp.php:47
filtercaldera_forms_get_form_processorsinc\class-icfp.php:53
filtercaldera_forms_submit_return_redirectinc\class-icfp.php:55
actionadmin_noticesintegration-of-caldera-forms-and-paystack.php:37
Maintenance & Trust

Integration of Caldera Forms and Paystack Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedMar 4, 2021
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Integration of Caldera Forms and Paystack Developer Profile

crystalwebpro

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Integration of Caldera Forms and Paystack

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/integration-of-caldera-forms-and-paystack/inc/class-icfp.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Integration of Caldera Forms and Paystack