Invelity MyGLS connect Security & Risk Analysis

wordpress.org/plugins/invelity-mygls-connect

Jednoduchý prenos objednávok do GLS cez API a tlač štítkov

200 active installs v1.1.1 PHP 8.0+ WP 5.0.0+ Updated May 30, 2025
glsshippingwoocommerce
78
B · Generally Safe
CVEs total1
Unpatched1
Last CVESep 5, 2025
Safety Verdict

Is Invelity MyGLS connect Safe to Use in 2026?

Mostly Safe

Score 78/100

Invelity MyGLS connect is generally safe to use. 1 past CVE were resolved. Keep it updated.

1 known CVE 1 unpatched Last CVE: Sep 5, 2025Updated 10mo ago
Risk Assessment

The invelity-mygls-connect plugin v1.1.1 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices in its handling of SQL queries, utilizing prepared statements exclusively. It also has a low attack surface with no identifiable AJAX handlers, REST API routes, shortcodes, or cron events directly exposed without authentication. Furthermore, a nonce check is present, indicating an awareness of potential CSRF vulnerabilities.

However, several significant concerns emerge. The presence of two instances of the `unserialize` function is a major red flag, as it is a common vector for Remote Code Execution if not handled with extreme caution and strict input validation. The taint analysis revealing one flow with unsanitized paths, classified as high severity, directly correlates with this risk and suggests that external input might be used in a way that could lead to a vulnerability. The limited output escaping (64%) also leaves room for potential Cross-Site Scripting (XSS) vulnerabilities.

The vulnerability history indicates a past medium severity Cross-Site Request Forgery (CSRF) vulnerability, which, although not critical, points to an area where the plugin might have had weaknesses. The fact that a vulnerability was discovered as recently as 2025-09-05, and it remains unpatched, is a critical issue. This suggests a lack of ongoing maintenance or a failure to address known security flaws promptly, further amplifying the risks associated with the identified code signals.

Key Concerns

  • Unpatched CVE found
  • High severity taint flow
  • Dangerous function: unserialize found
  • Output escaping is not fully robust (64%)
  • Bundled library TCPDF detected (potential outdatedness)
  • Zero capability checks found
Vulnerabilities
1

Invelity MyGLS connect Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-58833medium · 4.3Cross-Site Request Forgery (CSRF)

Invelity MyGLS connect <= 1.1.1 - Cross-Site Request Forgery

Sep 5, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Invelity MyGLS connect Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
21
38 escaped
Nonce Checks
1
Capability Checks
0
File Operations
1
External Requests
4
Bundled Libraries
1

Dangerous Functions Found

unserialize$successful = unserialize(urldecode($data_succesful));classes\class.invelityMyGLSConnectProcess.php:286
unserialize$unsuccessful = unserialize(urldecode($data_unsuccesful));classes\class.invelityMyGLSConnectProcess.php:287

Bundled Libraries

TCPDF

Output Escaping

64% escaped59 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
<class.invelityMyGLSConnectProcess> (classes\class.invelityMyGLSConnectProcess.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Invelity MyGLS connect Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_menuclasses\class.invelityMyGLSConnectAdmin.php:20
actionadmin_initclasses\class.invelityMyGLSConnectAdmin.php:21
actionadmin_footer-edit.phpclasses\class.invelityMyGLSConnectProcess.php:21
actionload-edit.phpclasses\class.invelityMyGLSConnectProcess.php:22
actionadmin_noticesclasses\class.invelityMyGLSConnectProcess.php:23
actioninvelity_my_gls_send_tracking_email_to_customerclasses\class.invelityMyGLSConnectProcess.php:24
actionadmin_enqueue_scriptsclasses\class.invelityPluginsAdmin.php:19
actionadmin_menuclasses\class.invelityPluginsAdmin.php:20
Maintenance & Trust

Invelity MyGLS connect Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedMay 30, 2025
PHP min version8.0
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs200
Developer Profile

Invelity MyGLS connect Developer Profile

INVELITY

8 plugins · 380 total installs

82
trust score
Avg Security Score
83/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Invelity MyGLS connect

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/invelity-mygls-connect/assets/css/invelity-mygls-connect-admin.css/wp-content/plugins/invelity-mygls-connect/assets/js/invelity-mygls-connect-admin.js
Script Paths
/wp-content/plugins/invelity-mygls-connect/assets/js/invelity-mygls-connect-admin.js
Version Parameters
invelity-mygls-connect-admin.css?ver=invelity-mygls-connect-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
invelity-mygls-connect-wrapper
Data Attributes
data-plugin-slug
JS Globals
invelityMyGLSConnectAdmin
FAQ

Frequently Asked Questions about Invelity MyGLS connect