GESTIX ERP/CRM API Security & Risk Analysis

wordpress.org/plugins/gestix-api

Gestix API

0 active installs v0.1.0 PHP 5.6+ WP 4.0.1+ Updated Sep 6, 2018
online-order-processingonline-storeopen-cart-softwarewebshop-invoicingwoocommerce-invoice
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GESTIX ERP/CRM API Safe to Use in 2026?

Generally Safe

Score 85/100

GESTIX ERP/CRM API has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The gestix-api plugin v0.1.0 exhibits a seemingly strong security posture in its static analysis, with zero identified AJAX handlers, REST API routes, shortcodes, or cron events contributing to its attack surface. All SQL queries are properly prepared, and there are no reported external HTTP requests or dangerous functions. However, the analysis reveals a significant concern regarding output escaping, with only 7% of 15 outputs being properly escaped, posing a risk of cross-site scripting (XSS) vulnerabilities if user-supplied data is involved in these outputs. Additionally, the complete absence of nonce checks and capability checks, despite the presence of file operations, indicates a potential for unauthorized actions or privilege escalation if these file operations can be triggered by unauthenticated or lower-privileged users.

The plugin's vulnerability history is clean, with no known CVEs, which is a positive indicator. This, combined with the absence of critical taint flows, suggests that the developers may have taken some precautions. However, the lack of any recorded vulnerabilities does not guarantee future safety, especially given the identified output escaping issues and the absence of robust access control mechanisms for critical operations like file manipulation.

In conclusion, while the plugin benefits from a minimal attack surface and secure SQL practices, the low percentage of properly escaped output and the lack of nonce and capability checks for file operations are significant weaknesses that require attention. The clean vulnerability history is encouraging but should not overshadow the immediate risks identified in the static analysis.

Key Concerns

  • Output escaping is very poor (7%)
  • No nonce checks on entry points
  • No capability checks on entry points
  • File operations present without auth checks
Vulnerabilities
None known

GESTIX ERP/CRM API Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

GESTIX ERP/CRM API Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

GESTIX ERP/CRM API Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

7% escaped15 total outputs
Attack Surface

GESTIX ERP/CRM API Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterwoocommerce_checkout_fieldsgestix.php:30
actionwoocommerce_admin_order_data_after_billing_addressgestix.php:52
actionwoocommerce_thankyougestix.php:145
actionadmin_menugestix.php:158
actionadmin_noticesgestix.php:168
Maintenance & Trust

GESTIX ERP/CRM API Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedSep 6, 2018
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

GESTIX ERP/CRM API Developer Profile

sergioflor

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GESTIX ERP/CRM API

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
gs_guide
Shortcode Output
<p><strong>NIF:</strong> <div class="container">NIF: Nome e Apelido:
FAQ

Frequently Asked Questions about GESTIX ERP/CRM API