MangoFp Security & Risk Analysis

wordpress.org/plugins/mangofp

Manage Contact Form 7 messages directly in WordPress like leads in the CRM system.

0 active installs v1.0.0 PHP 7.2+ WP 5.2+ Updated Unknown
contact-formcontact-form-7crmleadsmessages
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is MangoFp Safe to Use in 2026?

Generally Safe

Score 100/100

MangoFp has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

Based on the static analysis, the "mangofp" v1.0.0 plugin presents a seemingly strong security posture with no identified critical vulnerabilities in its code. The absence of an attack surface through AJAX handlers, REST API routes, shortcodes, or cron events significantly reduces potential entry points for attackers. Furthermore, the plugin demonstrates good practices by utilizing prepared statements for 85% of its SQL queries and avoiding dangerous functions, file operations, and external HTTP requests. The vulnerability history being clear of any recorded CVEs further reinforces this positive impression, suggesting a well-maintained or recently developed plugin without known exploitable flaws.

However, a closer examination reveals areas for concern. The limited output escaping (only 50% properly escaped for 2 outputs) presents a risk of cross-site scripting (XSS) vulnerabilities if the unescaped outputs are user-controlled or contain dynamic data. The presence of only one capability check, while the total entry points are zero, is unusual and could indicate a lack of necessary access controls if any entry points were to be discovered in future versions or through other means. The zero taint analysis flows is also notable, as it might mean the analysis was limited or that there were no detectable sensitive data flows. While the plugin currently appears secure, the aforementioned areas of concern warrant attention to ensure robust security in the long term.

Key Concerns

  • Half of outputs are not properly escaped
  • Only one capability check present
Vulnerabilities
None known

MangoFp Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

MangoFp Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
17 prepared
Unescaped Output
1
1 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

85% prepared20 total queries

Output Escaping

50% escaped2 total outputs
Attack Surface

MangoFp Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_enqueue_scriptsmangofp.php:135
actionadmin_enqueue_scriptsmangofp.php:139
actionadmin_menumangofp.php:216
actionwpcf7_before_send_mailmangofp.php:217
actionrest_api_initmangofp.php:218
actionplugins_loadedmangofp.php:219
actioninitmangofp.php:220
Maintenance & Trust

MangoFp Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedUnknown
PHP min version7.2
Downloads838

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

MangoFp Developer Profile

andresjarviste

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MangoFp

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mangofp/assets/js/chunk-vendors.js/wp-content/plugins/mangofp/assets/js/app.js/wp-content/plugins/mangofp/assets/css/chunk-vendors.css/wp-content/plugins/mangofp/assets/css/app.css
Script Paths
http://localhost:8080/js/chunk-vendors.jshttp://localhost:8080/js/app.jshttp://localhost:3000/js/chunk-vendors.jshttp://localhost:3000/js/app.js
Version Parameters
mangofp/assets/js/chunk-vendors.js?ver=mangofp/assets/js/app.js?ver=mangofp/assets/css/chunk-vendors.css?ver=mangofp/assets/css/app.css?ver=

HTML / DOM Fingerprints

JS Globals
MANGOFP_RESOURCES
REST Endpoints
/wp-json/mangofp/v1/labels/wp-json/mangofp/v1/templates/wp-json/mangofp/v1/templates/(?P<templateCode>[a-zA-Z0-9-]+)/wp-json/mangofp/v1/messages/wp-json/mangofp/v1/test2/wp-json/mangofp/v1/messages/(?P<uuid>[a-zA-Z0-9-]+)/emails/wp-json/mangofp/v1/messages/(?P<uuid>[a-zA-Z0-9-]+)/wp-json/mangofp/v1/messages/(?P<uuid>[a-zA-Z0-9-]+)/history/(?P<historyItemId>[^ /]+)/wp-json/mangofp/v1/attachments/wp-json/mangofp/v1/steps/wp-json/mangofp/v1/steps/(?P<code>[a-zA-Z0-9-]+)
Shortcode Output
<div id="app"></div>
FAQ

Frequently Asked Questions about MangoFp