
Pay with Contact Form 7 Security & Risk Analysis
wordpress.org/plugins/pay-with-contact-form-7This Add-on seamlessly integrates PayPal with Contact Form 7.
Is Pay with Contact Form 7 Safe to Use in 2026?
High Risk
Score 30/100Pay with Contact Form 7 carries significant security risk with 3 known CVEs, 3 still unpatched. Consider switching to a maintained alternative.
The 'pay-with-contact-form-7' plugin, version 1.0.4, exhibits a mixed security posture. While the static analysis reveals a seemingly small attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events without proper checks, several concerning code signals are present. The significant number of dangerous functions, specifically 'unserialize', and a concerningly low percentage of SQL queries using prepared statements (13%) indicate potential vulnerabilities. Furthermore, less than half of the output data is properly escaped, increasing the risk of Cross-Site Scripting (XSS) attacks. The plugin's vulnerability history is a major concern, with three known medium-severity CVEs, all of which are currently unpatched. The common vulnerability types reported (XSS, CSRF, SQL Injection) align with the code signals suggesting improper input handling and SQL query construction. Despite the lack of critical taint flows detected in this static analysis, the established history of unpatched vulnerabilities and the identified code weaknesses paint a picture of a plugin that requires immediate attention and patching.
Key Concerns
- Unpatched CVEs (3)
- High percentage of SQL queries without prepared statements
- Low percentage of properly escaped output
- Dangerous function 'unserialize' used
Pay with Contact Form 7 Security Vulnerabilities
CVEs by Year
Severity Breakdown
3 total CVEs
Pay with Contact Form 7 <= 1.0.4 - Reflected Cross-Site Scripting
Pay with Contact Form 7 <= 1.0.4 - Cross-Site Request Forgery
Pay with Contact Form 7 <= 1.0.4 - Authenticated (Administrator+) SQL Injection
Pay with Contact Form 7 Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Pay with Contact Form 7 Attack Surface
WordPress Hooks 11
Maintenance & Trust
Pay with Contact Form 7 Maintenance & Trust
Maintenance Signals
Community Trust
Pay with Contact Form 7 Alternatives
Redirection for Contact Form 7
wpcf7-redirect
Redirect to any page or URL, execute scripts after submission, save data to the database, and unlock additional submission actions for Contact Form 7.
Database Addon for Contact Form 7 – CFDB7
contact-form-cfdb7
Save and manage Contact Form 7 messages. Never lose important data. It is a lightweight contact form 7 database plugin.
Advanced Contact form 7 DB
advanced-cf7-db
Save all contact form 7 form submitted data to the database, View, Ordering, Change field labels and Import/Export data using CSV.
Connect Contact Form 7 and Mailchimp
contact-form-7-mailchimp-extension
Connect Contact Form 7 to Mailchimp. Automatically sync form submissions to your Mailchimp audiences with merge field mapping, double opt-in, and opt- …
Contact Form 7 Multi-Step Forms
contact-form-7-multi-step-module
Enables the Contact Form 7 plugin to create multi-page, multi-step forms.
Pay with Contact Form 7 Developer Profile
1 plugin · 100 total installs
How We Detect Pay with Contact Form 7
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/pay-with-contact-form-7/css/wpcmscf7-admin.css/wp-content/plugins/pay-with-contact-form-7/js/wpcmscf7-admin.js/wpcmscf7-admin.css?ver=/wpcmscf7-admin.js?ver=HTML / DOM Fingerprints
wpcmscf7_additional_settingswpcmscf7_enablewpcmscf7_namewpcmscf7_pricewpcmscf7_idwpcmscf7_email