
e-Boekhouden.nl Security & Risk Analysis
wordpress.org/plugins/e-boekhoudennl-connectorA plugin which exports orders to e-Boekhouden.nl
Is e-Boekhouden.nl Safe to Use in 2026?
Use With Caution
Score 63/100e-Boekhouden.nl has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The e-boekhoudennl-connector v1.9.3 plugin presents a mixed security posture. On one hand, it demonstrates good practices by having a limited attack surface with no apparent unprotected entry points like AJAX handlers, REST API routes, or shortcodes. Furthermore, it avoids dangerous functions and external HTTP requests. However, significant concerns arise from its handling of SQL queries, with 100% of them not using prepared statements, indicating a high risk of SQL injection vulnerabilities. The low percentage of properly escaped output (26%) also points to potential Cross-Site Scripting (XSS) vulnerabilities.
The vulnerability history reveals a concerning pattern, with one medium severity CVE historically and currently unpatched. The common vulnerability type being Cross-Site Scripting further corroborates the risks identified in the code analysis. The presence of an unpatched vulnerability, even if medium severity, poses an immediate risk to users of this plugin.
In conclusion, while the plugin has strengths in limiting its attack surface and avoiding certain risky coding patterns, the prevalent use of raw SQL queries and the documented unpatched XSS vulnerability create substantial security risks. The 100% unsanitized taint flows with unsanitized paths are particularly alarming, suggesting that user-supplied data is not being properly handled, potentially leading to various injection attacks.
Key Concerns
- Unpatched CVE (medium severity)
- SQL queries without prepared statements
- Low percentage of properly escaped output
- Flows with unsanitized paths
- File operations detected
- External HTTP requests detected
- No nonce checks
e-Boekhouden.nl Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
e-Boekhouden.nl <= 1.9.3 - Reflected Cross-Site Scripting
e-Boekhouden.nl Release Timeline
e-Boekhouden.nl Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
e-Boekhouden.nl Attack Surface
WordPress Hooks 10
Maintenance & Trust
e-Boekhouden.nl Maintenance & Trust
Maintenance Signals
Community Trust
e-Boekhouden.nl Alternatives
Combidesk – e-Boekhouden voor WooCommerce
combidesk-eboekhouden
This integration automatically exchanges important data between WooCommerce and e-Boekhouden. This saves time, you never have to do duplicate work aga …
Silvasoft boekhouden
silvasoft-boekhouden
Koppel WooCommerce aan uw Silvasoft bedrijfssoftware voor automatische boekhouding, orders & facturatie en voorraadbeheer. Automatisch. Eenvoudig.
Acumulus
acumulus
The Acumulus plugin connects your Woocommerce store to the Dutch SIEL Acumulus online financial administration application.
Carta Online
carta-online
Use the Carta Online WordPress plugin to embed your offerings on your website.
Planaday Connector
planaday-connector
Toon het cursusaanbod vanuit Planaday op jouw website met de verschillende shortcodes die deze WordPress plugin beschikbaar stelt.
e-Boekhouden.nl Developer Profile
1 plugin · 100 total installs
How We Detect e-Boekhouden.nl
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/e-boekhoudennl-connector/css/e-boekhouden-admin.css/wp-content/plugins/e-boekhoudennl-connector/js/e-boekhouden-admin.js/wp-content/plugins/e-boekhoudennl-connector/js/e-boekhouden-admin.jse-boekhoudennl-connector/css/e-boekhouden-admin.css?ver=e-boekhoudennl-connector/js/e-boekhouden-admin.js?ver=HTML / DOM Fingerprints
wrape-Boekhouden.nl<!-- RBS FIX-->data-pagedata-idwindow.location