FPG – Endereço automático por Cep no Checkout Security & Risk Analysis

wordpress.org/plugins/fpg-endereco-automatico-por-cep-no-checkout

Preenche o endereço, no checkout, automáticamente através do cep.

900 active installs v1.1.4 PHP 7.4+ WP 6.0+ Updated Oct 24, 2024
cepcorreiosendereco-automaticoviacepwoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is FPG – Endereço automático por Cep no Checkout Safe to Use in 2026?

Generally Safe

Score 92/100

FPG – Endereço automático por Cep no Checkout has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "fpg-endereco-automatico-por-cep-no-checkout" plugin version 1.1.4 exhibits a very strong security posture. The code analysis reveals no dangerous functions, no direct SQL queries, and all potential outputs are properly escaped. Furthermore, there are no file operations or external HTTP requests, and critically, no identified nonce or capability checks are mentioned, which would typically be present for unprotected entry points. The taint analysis also shows zero flows with unsanitized paths, indicating no immediate risks of code injection or data manipulation through user-supplied input.

The plugin's vulnerability history is equally reassuring, with no known CVEs, past or present. This absence of historical vulnerabilities, coupled with the clean static analysis, suggests a developer who is either very careful or has implemented robust security practices from the outset. The zero attack surface entries that are unprotected further solidifies this assessment, meaning there are no obvious direct pathways for unauthorized actions.

In conclusion, the "fpg-endereco-automatico-por-cep-no-checkout" plugin version 1.1.4 appears to be exceptionally well-secured based on the provided data. The lack of identified vulnerabilities, combined with strong static analysis findings regarding safe coding practices, leads to a very high security rating. While the absence of nonce and capability checks on entry points is usually a concern, the reported zero unprotected entry points in the attack surface mitigates this risk significantly in this specific instance.

Vulnerabilities
None known

FPG – Endereço automático por Cep no Checkout Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

FPG – Endereço automático por Cep no Checkout Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

FPG – Endereço automático por Cep no Checkout Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_enqueue_scriptsfpg-endereco-automatico-por-cep-no-checkout.php:53
Maintenance & Trust

FPG – Endereço automático por Cep no Checkout Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedOct 24, 2024
PHP min version7.4
Downloads5K

Community Trust

Rating100/100
Number of ratings4
Active installs900
Developer Profile

FPG – Endereço automático por Cep no Checkout Developer Profile

fernandopaglacci

1 plugin · 900 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect FPG – Endereço automático por Cep no Checkout

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fpg-endereco-automatico-por-cep-no-checkout/js/fpg-autocomplete-address.js
Script Paths
/wp-content/plugins/fpg-endereco-automatico-por-cep-no-checkout/js/fpg-autocomplete-address.js
Version Parameters
fpg-endereco-automatico-por-cep-no-checkout/js/fpg-autocomplete-address.js?ver=1.1.4

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about FPG – Endereço automático por Cep no Checkout