Store file uploads for Contact Form 7 Security & Risk Analysis

wordpress.org/plugins/store-file-uploads-for-contact-form-7

When this is active, attachments sent trough Contact Form 7 shortcode [file ] will be stored in your Media Library

1K active installs v1.2.3 PHP + WP 4.9+ Updated Jun 7, 2024
contactfileformlibraryupload
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Store file uploads for Contact Form 7 Safe to Use in 2026?

Generally Safe

Score 92/100

Store file uploads for Contact Form 7 has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "store-file-uploads-for-contact-form-7" plugin v1.2.3 exhibits a strong security posture. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface. Furthermore, the code signals are overwhelmingly positive, with no dangerous functions, all SQL queries using prepared statements, and all outputs properly escaped. The presence of a single file operation is noted, but without further context, it's impossible to assess its inherent risk. The taint analysis further reinforces this good security standing, with no identified flows involving unsanitized paths or any critical or high-severity issues.

The vulnerability history is equally reassuring, with zero known CVEs and no previously recorded vulnerabilities. This suggests a developer who prioritizes security or that the plugin has not been a target of extensive security research. The lack of any recorded vulnerability types also contributes to a positive assessment. While the absence of capability checks and nonce checks on the limited entry points might be a point of consideration for plugins with more extensive interaction, in this specific case, the minimal attack surface likely mitigates the immediate risk.

In conclusion, the plugin demonstrates excellent security practices with a very small attack surface and clean code signals. The complete absence of known vulnerabilities and critical taint flows points to a robust and secure implementation. The only potential area for a minor enhancement would be the explicit addition of capability and nonce checks, even given the limited entry points, to further harden the plugin against potential future threats.

Vulnerabilities
None known

Store file uploads for Contact Form 7 Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Store file uploads for Contact Form 7 Release Timeline

v1.2.3Current
v1.2.2
v1.2.1
v1.2.0
v1.1.0
v1.0.0
Code Analysis
Analyzed Mar 16, 2026

Store file uploads for Contact Form 7 Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0
Attack Surface

Store file uploads for Contact Form 7 Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwpcf7_before_send_mailstore-file-uploads-for-contact-form-7.php:74
Maintenance & Trust

Store file uploads for Contact Form 7 Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedJun 7, 2024
PHP min version
Downloads13K

Community Trust

Rating100/100
Number of ratings6
Active installs1K
Developer Profile

Store file uploads for Contact Form 7 Developer Profile

mirceatm

4 plugins · 2K total installs

81
trust score
Avg Security Score
90/100
Avg Patch Time
39 days
View full developer profile
Detection Fingerprints

How We Detect Store file uploads for Contact Form 7

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Store file uploads for Contact Form 7