
Envíopack (México) Security & Risk Analysis
wordpress.org/plugins/enviopack-mexicoLogística de alto desempeño para empresas que no pueden fallar.
Is Envíopack (México) Safe to Use in 2026?
Generally Safe
Score 100/100Envíopack (México) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "enviopack-mexico" plugin v1.0.15 presents a mixed security posture. While it demonstrates good practices in SQL query handling and output escaping, significant concerns arise from its attack surface and the lack of proper authorization checks on several entry points. The presence of four AJAX handlers without authentication checks is a primary risk, potentially allowing unauthorized users to trigger plugin functionality. Additionally, the use of the `unserialize` function is a known risk vector, especially if the data being unserialized originates from an untrusted source, as it can lead to remote code execution if not handled with extreme caution.
The plugin's vulnerability history is notably clean, with no recorded CVEs. This is a positive indicator, suggesting that previous versions may not have harbored critical flaws or that the developers have been proactive. However, this lack of history should not lead to complacency, especially given the identified vulnerabilities in the current static analysis. The absence of nonce checks on AJAX handlers further exacerbates the risk posed by the unprotected entry points.
In conclusion, "enviopack-mexico" v1.0.15 has strengths in its SQL handling and output escaping, which are crucial for preventing common web vulnerabilities. However, the substantial attack surface exposed by unprotected AJAX handlers and the potential risk associated with `unserialize` introduce significant security concerns that require immediate attention. The clean vulnerability history is encouraging but does not negate the risks identified in the current code analysis.
Key Concerns
- 4 AJAX handlers without auth checks
- 0 nonce checks found
- Dangerous function: unserialize used
- 1 unsanitized path in taint analysis
- Only 2 capability checks found
Envíopack (México) Security Vulnerabilities
Envíopack (México) Release Timeline
Envíopack (México) Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Envíopack (México) Attack Surface
AJAX Handlers 4
Shortcodes 1
WordPress Hooks 26
Maintenance & Trust
Envíopack (México) Maintenance & Trust
Maintenance Signals
Community Trust
Envíopack (México) Alternatives
Envíopack (Argentina)
enviopack-argentina
Logística de alto desempeño para empresas que no pueden fallar.
EnvíoPack (Chile)
enviopack
Logística de alto desempeño para empresas que no pueden fallar.
StoreCustomizer – A plugin to Customize all WooCommerce Pages
woocustomizer
A store editor plugin for editing all WooCommerce store and product pages, cart, checkout and user account pages, all within the WordPress Customizer
Storefront Product Sharing
storefront-product-sharing
Add attractive social sharing icons for Facebook, Twitter, Pinterest and Email to your product pages.
Storefront Footer Bar
storefront-footer-bar
Add a full width widgetised region above the default Storefront footer widget area.
Envíopack (México) Developer Profile
3 plugins · 110 total installs
How We Detect Envíopack (México)
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/enviopack-mexico/css/admin.cssenviopack-mexico/css/admin.css?ver=HTML / DOM Fingerprints
info-text Campo desactivado por no estár disponible en México (aún)
name="api_key"name="api_secret"name="branch_office"name="packaging_mode"name="shipping_mode"name="default_shipping_status"+2 more/wc-api/ecom-enviopackIngresá tu dirección para conocer los costos de envio (Envío a Domicilio / Retiro por sucursal)