
HostFact bestelformulier integratie Security & Risk Analysis
wordpress.org/plugins/hostfact-bestelformulier-integratieEenvoudige manier om het bestelformulier van HostFact in de Wordpress website te integreren.
Is HostFact bestelformulier integratie Safe to Use in 2026?
Generally Safe
Score 99/100HostFact bestelformulier integratie has a strong security track record. Known vulnerabilities have been patched promptly.
The "hostfact-bestelformulier-integratie" v1.3 plugin exhibits a mixed security posture. On the positive side, the static analysis reveals excellent adherence to secure coding practices. There are no detected dangerous functions, all SQL queries use prepared statements, and all output is properly escaped. Furthermore, there are no file operations or external HTTP requests, which generally reduces the attack surface. The absence of taint flows with unsanitized paths is also a strong indicator of secure input handling.
However, the plugin does present some concerning areas. The static analysis highlights a lack of any nonce or capability checks across its entry points, including its single shortcode. This means that actions triggered by the shortcode are not protected against unauthorized execution or CSRF attacks. The vulnerability history, while showing no currently unpatched issues, indicates a past medium-severity Cross-Site Scripting (XSS) vulnerability. The fact that this vulnerability was recently disclosed (2024-12-11) and is no longer present suggests that the developer actively patches issues, but the presence of XSS in the past warrants caution.
In conclusion, while the plugin demonstrates good fundamental coding practices regarding SQL and output handling, the complete absence of authorization checks on its sole entry point is a significant weakness. Combined with the past XSS vulnerability, this suggests a moderate risk, particularly if the shortcode performs sensitive operations that are not adequately protected by WordPress's built-in role management.
Key Concerns
- No nonce checks on entry points
- No capability checks on entry points
- Past medium severity XSS vulnerability
HostFact bestelformulier integratie Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
HostFact bestelformulier integratie <= 1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
HostFact bestelformulier integratie Code Analysis
Output Escaping
HostFact bestelformulier integratie Attack Surface
Shortcodes 1
WordPress Hooks 1
Maintenance & Trust
HostFact bestelformulier integratie Maintenance & Trust
Maintenance Signals
Community Trust
HostFact bestelformulier integratie Alternatives
No alternatives data available yet.
HostFact bestelformulier integratie Developer Profile
1 plugin · 200 total installs
How We Detect HostFact bestelformulier integratie
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/hostfact-bestelformulier-integratie/hf-orderform.js/wp-content/plugins/hostfact-bestelformulier-integratie/hf-orderform.jshostfact-bestelformulier-integratie/hf-orderform.js?ver=HTML / DOM Fingerprints
hf-orderform<iframe src="" scrolling="no" class="hf-orderform" style="width:100%;border:0;overflow-y:hidden;"></iframe>