Custom Post Type to Map Store Security & Risk Analysis

wordpress.org/plugins/cpt-to-map-store

An another Store Locator on WordPress but with OpenStreetMap & Leaflet and Meta Fields

40 active installs v1.1.0 PHP 7.0+ WP 4.0+ Updated Jun 19, 2020
geojsonmapopen-street-mapopenstreetmapstore-locator
64
C · Use Caution
CVEs total1
Unpatched1
Last CVENov 28, 2024
Safety Verdict

Is Custom Post Type to Map Store Safe to Use in 2026?

Use With Caution

Score 64/100

Custom Post Type to Map Store has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Nov 28, 2024Updated 5yr ago
Risk Assessment

The "cpt-to-map-store" plugin v1.1.0 exhibits a mixed security posture. On one hand, the static analysis shows no identified entry points (AJAX, REST API, shortcodes, cron events) that are directly exposed without authentication or permission checks, which is a positive sign. Furthermore, all SQL queries are properly prepared, and there are no file operations or external HTTP requests, reducing common attack vectors. However, the presence of the `unserialize` function is a significant concern, as it can lead to Remote Code Execution (RCE) if an attacker can control the serialized data. The lack of nonce checks and capability checks further exacerbates this risk, as there are no mechanisms to verify user intent or authorization before potentially dangerous operations are executed.

The vulnerability history reveals a past medium severity CVE, specifically a Cross-Site Request Forgery (CSRF). The fact that this vulnerability is currently unpatched is a critical red flag, indicating an ongoing risk that has not been addressed by the developer. This pattern of past vulnerabilities, coupled with the current unpatched issue, suggests a potential lack of ongoing security maintenance and a tendency for vulnerabilities to remain unresolved, which is a concerning indicator for future security. While the attack surface appears limited and some good coding practices are present, the `unserialize` function in conjunction with missing security checks and an unpatched CVE presents a tangible risk to users of this plugin.

Key Concerns

  • Unpatched Medium Severity CVE
  • Dangerous function: unserialize
  • Missing nonce checks
  • Missing capability checks
  • Output escaping not fully proper (41% not escaped)
Vulnerabilities
1

Custom Post Type to Map Store Security Vulnerabilities

CVEs by Year

1 CVE in 2024 · unpatched
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-53769medium · 6.1Cross-Site Request Forgery (CSRF)

Custom Post Type to Map Store <= 1.1.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting

Nov 28, 2024Unpatched
Code Analysis
Analyzed Mar 16, 2026

Custom Post Type to Map Store Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
4 prepared
Unescaped Output
22
32 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserializeif( is_string( $data ) && $s = unserialize( $data ) ) {includes\class-cpt-to-map-store.php:280

SQL Query Safety

100% prepared4 total queries

Output Escaping

59% escaped54 total outputs
Attack Surface

Custom Post Type to Map Store Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_menuadmin\class-cpt-to-map-store-admin.php:78
actionadmin_enqueue_scriptsadmin\class-cpt-to-map-store-admin.php:83
actionadmin_enqueue_scriptsadmin\class-cpt-to-map-store-admin.php:84
actionplugins_loadedcpt-to-map-store.php:43
actionadmin_noticescpt-to-map-store.php:58
actionrest_api_initincludes\class-cpt-to-map-store.php:166
actionwp_enqueue_scriptspublic\class-cpt-to-map-store-public.php:77
actionadmin_enqueue_scriptspublic\class-cpt-to-map-store-public.php:78
Maintenance & Trust

Custom Post Type to Map Store Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedJun 19, 2020
PHP min version7.0
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs40
Developer Profile

Custom Post Type to Map Store Developer Profile

lriaudel

1 plugin · 40 total installs

69
trust score
Avg Security Score
64/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Post Type to Map Store

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cpt-to-map-store/assets/css/admin.css/wp-content/plugins/cpt-to-map-store/assets/js/admin.js
Script Paths
/wp-content/plugins/cpt-to-map-store/assets/js/admin.js
Version Parameters
cpt-to-map-store/assets/css/admin.css?ver=cpt-to-map-store/assets/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
cpt-to-map-store-settings
HTML Comments
<!-- HELP: https://codex.wordpress.org/Validating_Sanitizing_and_Escaping_User_Data -->
Data Attributes
data-id_setting_page
JS Globals
Cpt_To_Map_Store
FAQ

Frequently Asked Questions about Custom Post Type to Map Store