
FACTO – Facturación Electrónica Security & Risk Analysis
wordpress.org/plugins/facto-facturacioacuten-electroacutenicaCon este plugin Integra el módulo FACTO con tu sitio web y automatiza la emisión de documentos electrónicos cada vez que recibes una compra.
Is FACTO – Facturación Electrónica Safe to Use in 2026?
Generally Safe
Score 100/100FACTO – Facturación Electrónica has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin "facto-facturacioacuten-electroacutenica" v3.0.4 exhibits a mixed security posture. On one hand, it demonstrates good practices by utilizing prepared statements for all SQL queries and performing a majority of output escaping. The absence of known CVEs and common vulnerability types in its history is a positive indicator, suggesting a generally stable codebase regarding publicly known exploits.
However, significant concerns arise from the static analysis. The presence of the `unserialize` function, especially without any apparent nonce or capability checks, represents a critical potential for remote code execution if an attacker can control the serialized data. Furthermore, the taint analysis revealed two high-severity flows with unsanitized paths, directly linked to this `unserialize` function, indicating that external input could be used in a dangerous manner. The complete lack of nonce and capability checks across all identified entry points, though currently zero in number, leaves the plugin vulnerable if new entry points are introduced or if existing ones are overlooked in the future.
In conclusion, while the plugin benefits from a clean vulnerability history and good SQL practices, the identified use of `unserialize` with unsanitized input and a complete absence of authorization checks on potential entry points poses a substantial risk. The lack of specific protections for the `unserialize` function is the most pressing concern, potentially allowing for severe security breaches.
Key Concerns
- Unsanitized path flows (High severity)
- Dangerous function: unserialize used
- No nonce checks on entry points
- No capability checks on entry points
- Less than 100% output escaping
FACTO – Facturación Electrónica Security Vulnerabilities
FACTO – Facturación Electrónica Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
FACTO – Facturación Electrónica Attack Surface
WordPress Hooks 18
Maintenance & Trust
FACTO – Facturación Electrónica Maintenance & Trust
Maintenance Signals
Community Trust
FACTO – Facturación Electrónica Alternatives
No alternatives data available yet.
FACTO – Facturación Electrónica Developer Profile
1 plugin · 400 total installs
How We Detect FACTO – Facturación Electrónica
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/facto-facturacioacuten-electroacutenica/js/facto_fe_checkout.js/wp-content/plugins/facto-facturacioacuten-electroacutenica/css/facto_fe_admin.css/wp-content/plugins/facto-facturacioacuten-electroacutenica/js/facto_fe_admin.js/wp-content/plugins/facto-facturacioacuten-electroacutenica/js/facto_fe_checkout.js/wp-content/plugins/facto-facturacioacuten-electroacutenica/js/facto_fe_admin.jsfacto-facturacioacuten-electroacutenica/js/facto_fe_checkout.js?ver=facto-facturacioacuten-electroacutenica/css/facto_fe_admin.css?ver=facto-facturacioacuten-electroacutenica/js/facto_fe_admin.js?ver=HTML / DOM Fingerprints
forminp-text-factoid="facto_formulario"name="facto_webservice_mode"id="facto_webservice_mode"name="facto_webservice_user"id="facto_webservice_user"name="facto_webservice_pass"+11 morefacto_changemode