
ANAC XML Bandi di Gara Security & Risk Analysis
wordpress.org/plugins/avcpSoftware per la gestione dei Bandi di Gara e generazione dataset XML per ANAC (ex AVCP -Legge 190/2012 Art 1.32)
Is ANAC XML Bandi di Gara Safe to Use in 2026?
Generally Safe
Score 95/100ANAC XML Bandi di Gara has a strong security track record. Known vulnerabilities have been patched promptly.
The plugin "avcp" v7.7.3 presents a mixed security posture. While it demonstrates good practices in several areas, such as using prepared statements for all SQL queries and incorporating nonce and capability checks on its entry points, there are significant concerns that warrant attention. The static analysis revealed a notable percentage of output that is not properly escaped, indicating a potential for Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis identified flows with unsanitized paths, which, while not categorized as critical or high severity in this instance, still represent a risk if they were to interact with sensitive functions or data.
The vulnerability history of this plugin is a major concern. With a total of 4 known CVEs, all of which are classified as medium severity and focused on XSS and CSRF, it suggests a pattern of insecure input handling. Although there are no currently unpatched vulnerabilities, the historical presence of these common vulnerability types indicates a recurring need for careful input validation and output sanitization. The plugin's strengths lie in its robust use of prepared statements and its attempt to secure entry points. However, the recurring XSS and CSRF issues and the identified unsanitized paths in the taint analysis highlight a need for more rigorous security auditing and development practices.
Key Concerns
- Output escaping is not properly handled for a significant portion
- Taint analysis shows flows with unsanitized paths
- History of medium severity CVEs (XSS and CSRF)
ANAC XML Bandi di Gara Security Vulnerabilities
CVEs by Year
Severity Breakdown
4 total CVEs
ANAC XML Bandi di Gara <= 7.7 - Reflected Cross-Site Scripting
ANAC XML Bandi di Gara <= 7.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode
ANAC XML Bandi di Gara <= 7.5 - Cross-Site Request Forgery via settings.php
ANAC XML Bandi di Gara <= 7.5 - Authenticated (Editor+) Stored Cross-Site Scripting
ANAC XML Bandi di Gara Code Analysis
Bundled Libraries
Output Escaping
Data Flow Analysis
ANAC XML Bandi di Gara Attack Surface
AJAX Handlers 3
Shortcodes 4
WordPress Hooks 42
Maintenance & Trust
ANAC XML Bandi di Gara Maintenance & Trust
Maintenance Signals
Community Trust
ANAC XML Bandi di Gara Alternatives
ANAC XML Viewer
anac-xml-viewer
Software per la visualizzazione di dataset XML su tracciato ANAC (ex AVCP -Legge 190/2012 Art 1.32).
BananaCrystal Payment Gateway
bananacrystal-payment-gateway
BananaCrystal Payment Gateway plugin allows you to accept payments for your store or business almost free on your Wordpress Woocommerce store easily.
Connect CRM RealState
connect-crm-realstate
Import real estate properties from Inmovilla and Anaconda CRM systems into WordPress as custom post types.
ANAC XML Bandi di Gara Developer Profile
13 plugins · 13K total installs
How We Detect ANAC XML Bandi di Gara
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/avcp/css/font-awesome.min.css/wp-content/plugins/avcp/css/avcp-admin.css/wp-content/plugins/avcp/css/avcp-frontend.css/wp-content/plugins/avcp/js/avcp-admin.js/wp-content/plugins/avcp/js/avcp-frontend.jsavcp/style.css?ver=avcp/script.js?ver=HTML / DOM Fingerprints
avcp-frontend-wrapperavcp-admin-wrapperavcp-titleavcp-descavcp-dateavcp-authoravcp-metadata-avcp-idavcp_admin_ajax_objectavcp_frontend_ajax_object[avcp_display][avcp_form]