PeproDev CF7 SMS Notifier Security & Risk Analysis

wordpress.org/plugins/pepro-cf7-sms-notifier

Send notifications to User and Admins upon Contact Form 7 Submission

20 active installs v1.1.0 PHP 5.6+ WP 5.0+ Updated Jan 26, 2022
cf7-databasecf7-smscontact-form-7contact-form-7-notifierwordpress-contact-form
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PeproDev CF7 SMS Notifier Safe to Use in 2026?

Generally Safe

Score 85/100

PeproDev CF7 SMS Notifier has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The plugin "pepro-cf7-sms-notifier" v1.1.0 exhibits a mixed security posture. On the positive side, there are no publicly known vulnerabilities (CVEs) associated with this plugin, and the static analysis shows no identifiable direct entry points like AJAX handlers, REST API routes, or shortcodes that are unprotected. This suggests a generally good effort in limiting the direct attack surface. However, the code analysis reveals significant concerns. The presence of `unserialize` is a red flag, especially when combined with a lack of capability checks and a concerning percentage of improperly escaped output. The taint analysis indicating a flow with an unsanitized path further amplifies these worries, suggesting that user-controlled data might be processed without adequate sanitization, potentially leading to vulnerabilities like Cross-Site Scripting (XSS) or even more severe issues if combined with other insecure practices.

The SQL query usage is also a significant weakness, with 100% of the queries not utilizing prepared statements. This opens the plugin up to SQL injection vulnerabilities. The lack of capability checks on any potential code execution paths means that even if an entry point isn't immediately obvious, authenticated users might be able to trigger unintended actions. While the vulnerability history is clean, this could be due to a lack of rigorous security auditing rather than inherent security. The bundled libraries, DataTables and Select2, could also pose a risk if they are outdated and contain known vulnerabilities, though this is not explicitly stated in the provided data. Overall, the plugin has a potentially dangerous combination of insecure coding practices that could be exploited despite a seemingly limited attack surface and clean vulnerability history.

Key Concerns

  • Raw SQL without prepare
  • Dangerous function unserialize
  • Flows with unsanitized paths
  • Unescaped output percentage too low
  • No capability checks
  • Bundled libraries
Vulnerabilities
None known

PeproDev CF7 SMS Notifier Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

PeproDev CF7 SMS Notifier Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

PeproDev CF7 SMS Notifier Code Analysis

Dangerous Functions
1
Raw SQL Queries
5
0 prepared
Unescaped Output
53
16 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
2

Dangerous Functions Found

unserialize$data_array = unserialize($obj->extra_info);pepro-cf7-sms.php:933

Bundled Libraries

DataTablesSelect2

SQL Query Safety

0% prepared5 total queries

Output Escaping

23% escaped69 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
db_container (pepro-cf7-sms.php:801)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

PeproDev CF7 SMS Notifier Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actioninitpepro-cf7-sms.php:83
filterwpcf7_sendnormalsmspepro-cf7-sms.php:85
filterwpcf7_sendultrafastsmspepro-cf7-sms.php:86
actionwpcf7_mail_sentpepro-cf7-sms.php:88
filterwpcf7_editor_panelspepro-cf7-sms.php:90
actionwpcf7_after_savepepro-cf7-sms.php:91
actionplugin_row_metapepro-cf7-sms.php:105
actionadmin_menupepro-cf7-sms.php:106
actionadmin_initpepro-cf7-sms.php:107
actionadmin_enqueue_scriptspepro-cf7-sms.php:108
filteradmin_footer_textpepro-cf7-sms.php:555
filterupdate_footerpepro-cf7-sms.php:560
actionplugins_loadedpepro-cf7-sms.php:1632
Maintenance & Trust

PeproDev CF7 SMS Notifier Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedJan 26, 2022
PHP min version5.6
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

PeproDev CF7 SMS Notifier Developer Profile

Pepro Dev. Group

6 plugins · 8K total installs

69
trust score
Avg Security Score
85/100
Avg Patch Time
129 days
View full developer profile
Detection Fingerprints

How We Detect PeproDev CF7 SMS Notifier

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pepro-cf7-sms-notifier/assets/css/cf7_edit_screen.css/wp-content/plugins/pepro-cf7-sms-notifier/assets/js/cf7_edit_screen.js/wp-content/plugins/pepro-cf7-sms-notifier/assets/js/cf7sms.js
Script Paths
/wp-content/plugins/pepro-cf7-sms-notifier/assets/js/cf7_edit_screen.js/wp-content/plugins/pepro-cf7-sms-notifier/assets/js/cf7sms.js
Version Parameters
pepro-cf7-sms-notifier/assets/css/cf7_edit_screen.css?ver=pepro-cf7-sms-notifier/assets/js/cf7_edit_screen.js?ver=pepro-cf7-sms-notifier/assets/js/cf7sms.js?ver=

HTML / DOM Fingerprints

CSS Classes
pepro_cf7sms_panelcf7sms_setting_sectionpepro_cf7sms_active_sms_admincf7smscheckbox
Data Attributes
name="pepro_cf7sms[active_sms_admin]"name="pepro_cf7sms[admin_sms_mobile]"name="pepro_cf7sms[active_sms_user]"name="pepro_cf7sms[user_sms_mobile]"name="pepro_cf7sms[active_sms_user_template]"name="pepro_cf7sms[user_sms_template]"+10 more
JS Globals
window.cf7smsvar cf7sms_obj
REST Endpoints
/wp-json/cf7sms/v1/send/wp-json/cf7sms/v1/settings
FAQ

Frequently Asked Questions about PeproDev CF7 SMS Notifier