
GDEZAKAZI.RU Security & Risk Analysis
wordpress.org/plugins/gdezakazi-ruГДЕЗАКАЗЫ.РФ - отслеживание посылок Почта России v.1.0 Разработано ГДЕЗАКАЗЫ.РФ Модуль использует функционал сервиса ГДЕЗАКАЗЫ.
Is GDEZAKAZI.RU Safe to Use in 2026?
Generally Safe
Score 85/100GDEZAKAZI.RU has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "gdezakazi-ru" v1.0 plugin exhibits a concerning security posture due to a significant lack of input validation and authorization checks. The static analysis reveals two AJAX handlers, both of which are entirely unprotected. This represents a substantial attack surface, as any unauthenticated user can potentially trigger these functions. Furthermore, the plugin performs SQL queries without using prepared statements, increasing the risk of SQL injection vulnerabilities. While there are no known vulnerabilities in its history, this is likely due to the limited attack surface in other areas (e.g., no shortcodes, no REST API routes) rather than robust security practices.
The identified taint flow with an unsanitized path, combined with the unprotected AJAX handlers, suggests a high risk of arbitrary file access or manipulation if the AJAX endpoints interact with the file system or user-supplied paths. The lack of nonce and capability checks on the AJAX handlers exacerbates this risk, allowing any visitor to execute potentially sensitive code. The plugin also has external HTTP requests, which could be exploited if the targets of these requests are controllable or if the plugin doesn't properly validate the responses.
While the absence of critical code signals like dangerous functions is a positive aspect, it is heavily overshadowed by the critical vulnerabilities in access control and data handling. The 50% rate of proper output escaping is also a weakness, as it implies that half of the plugin's outputs are susceptible to cross-site scripting (XSS) attacks. The vulnerability history being clear of CVEs is a good sign but doesn't negate the inherent risks present in the current code. In conclusion, "gdezakazi-ru" v1.0 has significant security weaknesses that require immediate attention, primarily concerning its unprotected AJAX endpoints and raw SQL queries.
Key Concerns
- AJAX handlers without auth checks
- SQL queries without prepared statements
- Flows with unsanitized paths (taint analysis)
- Output escaping is not fully proper (50% good)
- No nonce checks on AJAX handlers
- No capability checks on AJAX handlers
GDEZAKAZI.RU Security Vulnerabilities
GDEZAKAZI.RU Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
GDEZAKAZI.RU Attack Surface
AJAX Handlers 2
WordPress Hooks 10
Scheduled Events 1
Maintenance & Trust
GDEZAKAZI.RU Maintenance & Trust
Maintenance Signals
Community Trust
GDEZAKAZI.RU Developer Profile
1 plugin · 10 total installs
How We Detect GDEZAKAZI.RU
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/gdezakazi-ru/css/order.css/wp-content/plugins/gdezakazi-ru/js/order.js/wp-content/plugins/gdezakazi-ru/js/order.jsgdezakazi_order_stylesgdezakazi_order_scriptHTML / DOM Fingerprints
gdezakazy_order_wrap