Inpost Paczkomaty Security & Risk Analysis

wordpress.org/plugins/inpost-paczkomaty

Umożliwia dodanie Paczkomaty Inpost jako forma dostawy produktów. Zawiera mapkę gdzie można wybrać paczkomat w którym chce się odebrać przesyłkę.

8K active installs v1.0.34 PHP 7.4+ WP 5.3+ Updated Jan 11, 2024
inpostpaczkomaty
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Inpost Paczkomaty Safe to Use in 2026?

Generally Safe

Score 85/100

Inpost Paczkomaty has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "inpost-paczkomaty" plugin version 1.0.34 exhibits a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for SQL queries, avoiding dangerous functions, and properly escaping the vast majority of its output. There are also no known vulnerabilities recorded for this plugin, suggesting a history of stable and secure development or a lack of targeted attacks.

However, a significant concern arises from the static analysis of its attack surface. Out of four identified entry points, three are AJAX handlers that lack any authentication checks. This exposes these handlers to potential exploitation by unauthenticated users, creating a substantial risk. The absence of taint analysis data makes it impossible to assess the impact of these unprotected AJAX handlers, but their presence alone is a critical security weakness. The lack of nonce checks on these AJAX handlers is also a notable omission.

In conclusion, while the plugin has strong fundamentals in SQL and output handling and a clean vulnerability history, the unprotected AJAX endpoints are a major vulnerability. The absence of authentication on these critical entry points overshadows its other strengths, making it a target for attackers seeking to exploit unauthenticated functionality.

Key Concerns

  • Unprotected AJAX handlers
  • Missing nonce checks on AJAX
  • Capability checks are minimal
Vulnerabilities
None known

Inpost Paczkomaty Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Inpost Paczkomaty Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
63 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

95% escaped66 total outputs
Attack Surface
3 unprotected

Inpost Paczkomaty Attack Surface

Entry Points4
Unprotected3

AJAX Handlers 3

authwp_ajax_save_shortcode_cart_checkout_ajaxadmin\admin.php:519
authwp_ajax_set_paczkomatinpost-paczkomaty.php:879
noprivwp_ajax_set_paczkomatinpost-paczkomaty.php:880

Shortcodes 1

[fee] inpost-paczkomaty.php:363
WordPress Hooks 15
actionadmin_initadmin\admin.php:146
actionadmin_menuadmin\admin.php:444
actionadmin_noticesadmin\admin.php:494
actionadmin_footerinpost-paczkomaty.php:122
actionwoocommerce_shipping_initinpost-paczkomaty.php:606
actionwoocommerce_before_cartinpost-paczkomaty.php:615
actionwoocommerce_before_checkout_forminpost-paczkomaty.php:636
actionwoocommerce_checkout_processinpost-paczkomaty.php:655
actionwoocommerce_after_shipping_rateinpost-paczkomaty.php:670
actionwoocommerce_checkout_update_order_metainpost-paczkomaty.php:754
actionwoocommerce_admin_order_data_after_shipping_addressinpost-paczkomaty.php:826
filterwoocommerce_get_order_item_totalsinpost-paczkomaty.php:866
actionwoocommerce_before_cartinpost-paczkomaty.php:871
filterwoocommerce_shipping_methodsinpost-paczkomaty.php:939
actioninitinpost-paczkomaty.php:941
Maintenance & Trust

Inpost Paczkomaty Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedJan 11, 2024
PHP min version7.4
Downloads64K

Community Trust

Rating96/100
Number of ratings32
Active installs8K
Developer Profile

Inpost Paczkomaty Developer Profile

Damian Ziarnik

1 plugin · 8K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Inpost Paczkomaty

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/inpost-paczkomaty/assets/css/inpost.css/wp-content/plugins/inpost-paczkomaty/assets/js/inpost-paczkomaty-admin.js/wp-content/plugins/inpost-paczkomaty/assets/js/inpost-paczkomaty-frontend.js
Script Paths
/wp-content/plugins/inpost-paczkomaty/assets/js/inpost-paczkomaty-admin.js/wp-content/plugins/inpost-paczkomaty/assets/js/inpost-paczkomaty-frontend.js
Version Parameters
/wp-content/plugins/inpost-paczkomaty/assets/css/inpost.css?ver=/wp-content/plugins/inpost-paczkomaty/assets/js/inpost-paczkomaty-admin.js?ver=/wp-content/plugins/inpost-paczkomaty/assets/js/inpost-paczkomaty-frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
inpost_paczkomaty_shipping_method
HTML Comments
<!-- Settings inpost-paczkomaty --><!-- This is the meta box for settings -->
Data Attributes
data-inpost-map-urldata-inpost-api-key
JS Globals
inpostPaczkomatyAdmininpostPaczkomatyFrontend
REST Endpoints
/wp-json/inpost-paczkomaty/v1/settings/wp-json/inpost-paczkomaty/v1/shipping-options
Shortcode Output
[inpost_map][inpost_shipping_options]
FAQ

Frequently Asked Questions about Inpost Paczkomaty