
DoliPress Security & Risk Analysis
wordpress.org/plugins/dolipressConnects Gravity Form to Dolibarr CRM/ERP.
Is DoliPress Safe to Use in 2026?
Generally Safe
Score 85/100DoliPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "dolipress" v1.0 plugin exhibits a seemingly strong security posture based on the provided static analysis and vulnerability history. The absence of any identified CVEs and the clean code signals, such as no dangerous functions, 100% prepared SQL statements, and a high percentage of properly escaped output, are positive indicators. The plugin also avoids common security pitfalls like directly handling file operations or making external HTTP requests without apparent sanitization in the analyzed flows. The attack surface is also notably clean, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that are unauthenticated or unprotected.
However, a significant concern arises from the complete lack of nonce checks and capability checks. While the current analysis shows no direct entry points needing these protections, this is a critical omission. It implies that if any new functionality is added or if the plugin's interaction points were not fully captured by the static analysis, there would be no built-in defense against common WordPress attacks like Cross-Site Request Forgery (CSRF). The taint analysis showing zero flows could be due to the limited scope of the analysis or genuinely no such flows; however, the absence of checks makes any potential future taint flows extremely risky.
In conclusion, while "dolipress" v1.0 appears robust against known threats and adheres to good coding practices in many areas, the absence of nonce and capability checks represents a significant, fundamental security weakness. This oversight could lead to critical vulnerabilities if the plugin's attack surface expands or if its interactions are not fully understood by the analysis. The plugin's history of zero vulnerabilities might be attributed to its limited functionality or a lack of past scrutiny, rather than inherent invulnerability. Therefore, while the current state is reassuring in some aspects, the lack of fundamental security checks is a serious concern.
Key Concerns
- Missing nonce checks
- Missing capability checks
- High percentage of unescaped output
DoliPress Security Vulnerabilities
DoliPress Release Timeline
DoliPress Code Analysis
Output Escaping
DoliPress Attack Surface
WordPress Hooks 3
Maintenance & Trust
DoliPress Maintenance & Trust
Maintenance Signals
Community Trust
DoliPress Alternatives
Gravity Forms Klaviyo Add-On
gf-klaviyo-add-on
Gravity Forms Klaviyo Add-On seamlessly integrates Gravity Forms with Klaviyo, enabling powerful email marketing automation.
Connector for Gravity Forms and Salesforce
gf-salesforce-crmperks
Gravity Forms Salesforce Add-on sends Gravity forms entries to salesforce CRM.
WP Gravity Forms Dynamics CRM
gf-dynamics-crm
Gravity Forms Dynamics CRM Add-on sends Gravity Forms entries to Dynamics CRM Online.
Business Forms for DoliProspect
business-forms-for-doliprospect
Easily integrate DoliProspect with WordPress to create business deal forms directly from your website.
DoliAppointments
doli-appointments
Easily integrate DoliAppointments with WordPress to create appointment booking forms directly from your website.
DoliPress Developer Profile
1 plugin · 0 total installs
How We Detect DoliPress
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/dolipress/css/bootstrap.css/wp-content/plugins/dolipress/js/bootstrap.js/wp-content/plugins/dolipress/js/core.js/wp-content/plugins/dolipress/js/javascript.js/wp-content/plugins/dolipress/css/style.css/wp-content/plugins/dolipress/js/bootstrap.js/wp-content/plugins/dolipress/js/core.js/wp-content/plugins/dolipress/js/javascript.js