getLaw WP API Client Security & Risk Analysis

wordpress.org/plugins/getlaw-wp-api-client

With this Plugin you can automatically embed legal texts of the Legal-Tech-Platform www.getLaw.de in your website and your shop.

600 active installs v1.1.4 PHP 7.1+ WP 4.6+ Updated Dec 2, 2025
agbbarrierefreiheitdatenschutzerklarungimpressumwiderruf
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is getLaw WP API Client Safe to Use in 2026?

Generally Safe

Score 100/100

getLaw WP API Client has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The getlaw-wp-api-client plugin version 1.1.4 exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, raw SQL queries, file operations, and an external HTTP request is commendable. Furthermore, all detected outputs are properly escaped, and the plugin utilizes prepared statements for its SQL queries, indicating good development practices in these areas. The plugin also demonstrates a conscious effort to implement capability checks, which is a positive sign for access control.

However, a significant concern arises from the complete lack of nonce checks across all identified entry points, particularly the single shortcode. While the static analysis reports 0 unprotected entry points, the absence of nonce verification for the shortcode means that its functionality could potentially be triggered by an attacker without proper user authorization or intent. The limited attack surface is a mitigating factor, but this oversight remains a potential avenue for exploitation. The plugin's vulnerability history is clean, with no recorded CVEs, which suggests either a lack of past issues or a strong security focus from the developers. Despite the clean history, the potential risk from the missing nonce check cannot be overlooked.

Key Concerns

  • Missing nonce checks on shortcode
Vulnerabilities
None known

getLaw WP API Client Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

getLaw WP API Client Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
25 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped25 total outputs
Attack Surface

getLaw WP API Client Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[getlaw] getlaw-wp-api-client.php:357
WordPress Hooks 6
actionplugins_loadedgetlaw-wp-api-client.php:229
filterplugin_action_linksgetlaw-wp-api-client.php:233
actionadmin_initgetlaw-wp-api-client.php:241
filterallowed_optionsgetlaw-wp-api-client.php:257
actionadmin_menugetlaw-wp-api-client.php:274
actionadmin_enqueue_scriptsgetlaw-wp-api-client.php:278
Maintenance & Trust

getLaw WP API Client Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 2, 2025
PHP min version7.1
Downloads9K

Community Trust

Rating100/100
Number of ratings1
Active installs600
Developer Profile

getLaw WP API Client Developer Profile

getlaw

1 plugin · 600 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect getLaw WP API Client

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/getlaw-wp-api-client/getlaw.css

HTML / DOM Fingerprints

CSS Classes
button-getlaw
Data Attributes
getlaw_imprint_keygetlaw_imprint_shortcodegetlaw_imprint_manual_updategetlaw_privacy_keygetlaw_privacy_shortcodegetlaw_privacy_manual_update+9 more
Shortcode Output
[getlaw text='impressum'][getlaw text='datenschutz'][getlaw text='agb'][getlaw text='widerruf']
FAQ

Frequently Asked Questions about getLaw WP API Client