AutoCEP Security & Risk Analysis

wordpress.org/plugins/autocep

O plugin AutoCEP preenche automaticamente os campos de endereço no checkout com base no CEP digitado pelo usuário.

1K active installs v1.5 PHP 7.0+ WP 5.0+ Updated Feb 3, 2026
autocompletecepcheckoutenderecowoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is AutoCEP Safe to Use in 2026?

Generally Safe

Score 100/100

AutoCEP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "autocep" v1.5 plugin demonstrates several good security practices, particularly in its use of prepared statements for SQL queries and proper output escaping, indicating an awareness of common web application vulnerabilities. The absence of known CVEs and taint analysis findings further contributes to a generally positive security posture. The plugin also utilizes a nonce check, which is a fundamental security measure for handling user interactions.

However, a significant concern arises from the presence of two AJAX handlers, both of which lack authentication checks. This creates an exposed attack surface where unauthenticated users could potentially trigger actions within the plugin, leading to unintended consequences. While the static analysis did not reveal specific dangerous functions or file operations, the lack of capability checks on these AJAX endpoints is a critical oversight. The plugin's vulnerability history shows no recorded issues, suggesting a good track record or a lack of extensive past security audits. Ultimately, while the plugin implements some important security controls, the unprotected AJAX endpoints represent a substantial risk that needs immediate attention.

Key Concerns

  • AJAX handlers without authentication checks
  • Lack of capability checks on entry points
Vulnerabilities
None known

AutoCEP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

AutoCEP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface
2 unprotected

AutoCEP Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_autocep_get_addressautocep.php:51
noprivwp_ajax_autocep_get_addressautocep.php:52
WordPress Hooks 1
actionwp_enqueue_scriptsautocep.php:49
Maintenance & Trust

AutoCEP Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.0
Last updatedFeb 3, 2026
PHP min version7.0
Downloads4K

Community Trust

Rating100/100
Number of ratings5
Active installs1K
Developer Profile

AutoCEP Developer Profile

wanderson100

1 plugin · 1K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AutoCEP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/autocep/js/autocomplete.js
Script Paths
/wp-content/plugins/autocep/js/autocomplete.js
Version Parameters
autocep-autocomplete?ver=

HTML / DOM Fingerprints

JS Globals
autocep_params
FAQ

Frequently Asked Questions about AutoCEP