Colissimo Delivery Integration Security & Risk Analysis

wordpress.org/plugins/colissimo-delivery-integration

Une intégration complète de Colissimo dans WooCommerce.

100 active installs v3.8.3 PHP 7.3+ WP 6.2+ Updated Dec 2, 2024
colissimolaposteparcelshippingwoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Colissimo Delivery Integration Safe to Use in 2026?

Generally Safe

Score 92/100

Colissimo Delivery Integration has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "colissimo-delivery-integration" plugin version 3.8.3 exhibits a concerning security posture primarily due to its complete lack of input validation and output escaping, despite having a minimal attack surface reported. The static analysis reveals that none of the five SQL queries utilize prepared statements, and similarly, the single output identified is not properly escaped. This combination presents a significant risk of SQL injection and Cross-Site Scripting (XSS) vulnerabilities, as any user-supplied data passed to these functions could be maliciously crafted. The absence of any capability checks or nonce checks on the reported zero entry points, while seemingly positive, doesn't mitigate the risks associated with vulnerable internal code paths that might not be directly exposed as entry points but could be triggered indirectly.

The plugin's vulnerability history is clean, with no recorded CVEs. This is a positive indicator, suggesting a general diligence in addressing known security flaws. However, the lack of historical vulnerabilities does not negate the critical code-level issues identified in the static analysis. The absence of taint analysis flows is likely a consequence of the limited attack surface or potentially limitations in the analysis tool, but it doesn't offer reassurance given the unescaped outputs and raw SQL.

In conclusion, while the plugin has a clean vulnerability history and a seemingly small attack surface, the static analysis highlights critical weaknesses in handling data. The widespread use of raw SQL without prepared statements and the lack of output escaping create a high risk of injection attacks. The plugin's security is fundamentally undermined by these basic coding oversights, which need immediate attention.

Key Concerns

  • Raw SQL queries without prepared statements (5)
  • No output escaping for identified outputs (1)
  • No capability checks found
  • No nonce checks found
Vulnerabilities
None known

Colissimo Delivery Integration Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Colissimo Delivery Integration Code Analysis

Dangerous Functions
0
Raw SQL Queries
5
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared5 total queries

Output Escaping

0% escaped1 total outputs
Attack Surface

Colissimo Delivery Integration Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_noticescolissimo-delivery-integration.php:67
Maintenance & Trust

Colissimo Delivery Integration Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedDec 2, 2024
PHP min version7.3
Downloads96K

Community Trust

Rating96/100
Number of ratings25
Active installs100
Developer Profile

Colissimo Delivery Integration Developer Profile

Halyra

2 plugins · 300 total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
295 days
View full developer profile
Detection Fingerprints

How We Detect Colissimo Delivery Integration

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/colissimo-delivery-integration/assets/css/custom.css/wp-content/plugins/colissimo-delivery-integration/assets/css/responsive.css/wp-content/plugins/colissimo-delivery-integration/assets/js/colissimo-admin.js/wp-content/plugins/colissimo-delivery-integration/assets/js/colissimo-frontend.js
Script Paths
/wp-content/plugins/colissimo-delivery-integration/assets/js/colissimo-admin.js/wp-content/plugins/colissimo-delivery-integration/assets/js/colissimo-frontend.js
Version Parameters
colissimo-delivery-integration/assets/css/custom.css?ver=colissimo-delivery-integration/assets/css/responsive.css?ver=colissimo-delivery-integration/assets/js/colissimo-admin.js?ver=colissimo-delivery-integration/assets/js/colissimo-frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
cdi-admin-notice
FAQ

Frequently Asked Questions about Colissimo Delivery Integration