Holnix Security & Risk Analysis

wordpress.org/plugins/holnix

Holnix permite a las librerías importar catálogos editoriales (metadata ONIX) directamente a WooCommerce.

10 active installs v1.1.3 PHP 7.4+ WP 5.8+ Updated Feb 13, 2026
librosmetadataonixpublishingwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Holnix Safe to Use in 2026?

Generally Safe

Score 100/100

Holnix has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The holnix plugin v1.1.3 exhibits a generally strong security posture, with several positive indicators such as 100% of SQL queries using prepared statements and 97% of output being properly escaped. The limited attack surface, with all entry points having checks, and the absence of any known historical vulnerabilities are significant strengths. However, the presence of two 'unserialize' calls is a notable concern. Unserialization of untrusted data can lead to Remote Code Execution vulnerabilities if not handled with extreme care. While taint analysis did not report critical or high-severity unsanitized flows involving these, the inherent risk remains. The plugin also lacks explicit capability checks, which, combined with the 'unserialize' calls, could pose a risk if the AJAX handlers are not sufficiently protected by other means (e.g., actions that don't require elevated privileges).

Despite the 'unserialize' concern and the absence of explicit capability checks, the overall security profile appears robust due to good practices in SQL and output handling, and a clean vulnerability history. The plugin demonstrates an awareness of common web vulnerabilities. The key area for improvement would be to review and potentially refactor the use of 'unserialize' to ensure it's never exposed to untrusted user input. The lack of recorded vulnerabilities is a strong positive signal, suggesting responsible development and a good understanding of security principles.

Key Concerns

  • Dangerous function call: unserialize
  • Missing capability checks on entry points
Vulnerabilities
None known

Holnix Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Holnix Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
3
94 escaped
Nonce Checks
9
Capability Checks
0
File Operations
2
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$items = unserialize($chunk_data);admin\import.php:178
unserialize$items = unserialize(get_option($chunk_key));admin\import.php:453

Output Escaping

97% escaped97 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
<class-holnix-admin> (admin\class-holnix-admin.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Holnix Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 3

authwp_ajax_holnix_fetch_imprint_batchadmin\class-holnix-admin.php:41
authwp_ajax_holnix_get_import_statusadmin\class-holnix-admin.php:42
authwp_ajax_holnix_start_full_importadmin\class-holnix-admin.php:43
WordPress Hooks 11
actionadmin_menuadmin\class-holnix-admin.php:39
actionadmin_initadmin\class-holnix-admin.php:40
filterpre_update_option_holnix_api_tokenadmin\class-holnix-admin.php:46
actionadmin_enqueue_scriptsadmin\class-holnix-admin.php:61
actionupdate_product_holnix_chunkadmin\import.php:660
actionupdate_related_productsadmin\import.php:665
actionadmin_noticesholnix.php:23
actionplugins_loadedholnix.php:33
actionadmin_noticesholnix.php:37
actionadmin_enqueue_scriptsholnix.php:130
actionpost_submitbox_startholnix.php:141
Maintenance & Trust

Holnix Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedFeb 13, 2026
PHP min version7.4
Downloads272

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Holnix Developer Profile

Iberpixel

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Holnix

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/holnix/admin/css/holnix-admin.css/wp-content/plugins/holnix/admin/js/holnix-admin.js
Version Parameters
holnix/style.css?ver=holnix-admin-styleholnix-admin-script

HTML / DOM Fingerprints

CSS Classes
holnix_options_groupnotice-successnotice-error
Data Attributes
id="holnix-modal"id="holnix-bg-modal"id="holnix-open-modal"id="holnix-close-modal"id="holnix-submit-modal"
JS Globals
holnixModalholnixBgModalopenModalBtncloseModalBtn
REST Endpoints
/wp-json/holnix/v1/data
Shortcode Output
<span id="holnix-open-modal" class="button">Actualizar</span><div id="holnix-modal"><div id="holnix-bg-modal" style=""></div>
FAQ

Frequently Asked Questions about Holnix