Alsendo Connect Security & Risk Analysis

wordpress.org/plugins/alsendo-connect

New plugin enabling integration with Ecolet, Zaslat, Apaczka. Offered availability of most carriers.

60 active installs v1.0.1 PHP 7.4+ WP 5.3+ Updated Oct 16, 2025
apaczkaecoletshipmentswoocommercezaslat
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Alsendo Connect Safe to Use in 2026?

Generally Safe

Score 100/100

Alsendo Connect has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The "alsendo-connect" plugin v1.0.1 presents a generally positive security posture based on the static analysis. It demonstrates good practices by having a small attack surface with no unprotected entry points, exclusively using prepared statements for SQL queries, and a high percentage of properly escaped output. The plugin also incorporates a robust number of nonce and capability checks, which are crucial for securing WordPress functionalities. The absence of any recorded vulnerabilities or CVEs in its history further bolsters this positive assessment, suggesting a history of secure development.

However, there are a few areas that warrant attention. The presence of two flows with unsanitized paths in the taint analysis, even if not categorized as critical or high severity, indicates a potential for injection vulnerabilities if these paths are directly influenced by user input without further sanitization. Additionally, the plugin makes 13 external HTTP requests, which, while not inherently a vulnerability, can introduce risks if the target endpoints are compromised or if the data being transmitted is sensitive and not adequately protected during transit. The bundling of Guzzle, while a powerful library, also carries the inherent risk of any outdated or vulnerable versions of bundled software.

Key Concerns

  • Flows with unsanitized paths detected
  • Bundled library Guzzle present
Vulnerabilities
None known

Alsendo Connect Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Alsendo Connect Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
20
296 escaped
Nonce Checks
16
Capability Checks
0
File Operations
0
External Requests
13
Bundled Libraries
1

Bundled Libraries

Guzzle

Output Escaping

94% escaped316 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

10 flows2 with unsanitized paths
ajax_callback (src\Ajax.php:27)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Alsendo Connect Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_alsendo_connectsrc\Ajax.php:20
WordPress Hooks 28
actionafter_setup_themealsendo-connect.php:55
actionadmin_noticesalsendo-connect.php:78
actionbefore_woocommerce_initalsendo-connect.php:84
actionadmin_noticessrc\Alerts.php:85
actionwp_loadedsrc\Ecolet.php:96
filterflexible_shipping_integration_optionssrc\FSHooks.php:28
filterflexible_shipping_method_integration_colsrc\FSHooks.php:32
filterwoocommerce_settings_tabs_arraysrc\Global_Settings_Integration.php:52
filterwoocommerce_admin_settings_sanitize_optionsrc\Global_Settings_Integration.php:164
actioninitsrc\Plugin\Abstract_Ilabs_Plugin.php:38
actionplugins_loadedsrc\Plugin\Abstract_Ilabs_Plugin.php:46
actionadmin_enqueue_scriptssrc\Plugin\Abstract_Ilabs_Plugin.php:87
actionwp_enqueue_scriptssrc\Plugin\Abstract_Ilabs_Plugin.php:91
filterwoocommerce_get_order_item_totalssrc\Plugin.php:72
filterwoocommerce_shipping_methodssrc\Plugin.php:97
actionwoocommerce_initsrc\Plugin.php:106
filterwoocommerce_get_settings_pagessrc\Plugin.php:148
actionwoocommerce_admin_order_data_after_shipping_addresssrc\Plugin.php:164
actionadd_meta_boxessrc\Shipping_Method_Alsendo_Connect.php:168
actionwoocommerce_checkout_update_order_metasrc\Shipping_Method_Alsendo_Connect.php:170
actionsave_postsrc\Shipping_Method_Alsendo_Connect.php:176
actionwoocommerce_process_shop_order_metasrc\Shipping_Method_Alsendo_Connect.php:177
actionwoocommerce_after_checkout_validationsrc\Shipping_Method_Alsendo_Connect.php:179
actionwoocommerce_store_api_checkout_update_order_from_requestsrc\Shipping_Method_Alsendo_Connect.php:186
actionwoocommerce_review_order_after_shippingsrc\Shipping_Method_Alsendo_Connect.php:189
actionwoocommerce_blocks_checkout_block_registrationsrc\Shipping_Method_Alsendo_Connect.php:196
actionwp_enqueue_scriptssrc\Shipping_Method_Alsendo_Connect.php:205
actionwoocommerce_after_shipping_ratesrc\Shipping_Rates.php:27
Maintenance & Trust

Alsendo Connect Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedOct 16, 2025
PHP min version7.4
Downloads482

Community Trust

Rating0/100
Number of ratings0
Active installs60
Developer Profile

Alsendo Connect Developer Profile

Alsendo Group

1 plugin · 60 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Alsendo Connect

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/alsendo-connect/dist/css/alsendo-connect.css/wp-content/plugins/alsendo-connect/dist/js/alsendo-connect.js
Script Paths
/wp-content/plugins/alsendo-connect/dist/js/alsendo-connect.js
Version Parameters
alsendo-connect/dist/css/alsendo-connect.css?ver=alsendo-connect/dist/js/alsendo-connect.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-alsendo-connect
JS Globals
AlsendoConnect
FAQ

Frequently Asked Questions about Alsendo Connect