
Invelity SPS connect Security & Risk Analysis
wordpress.org/plugins/invelity-sps-connectPlugin Invelity SPS (Slovak parcel service) connect je vytvorený pre obchodníkov na platforme Woocommerce ktorý potrebuju automaticky exportovat údaje …
Is Invelity SPS connect Safe to Use in 2026?
Use With Caution
Score 63/100Invelity SPS connect has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The plugin "invelity-sps-connect" v1.0.8 exhibits a mixed security posture. While it demonstrates good practices in some areas, such as 100% use of prepared statements for SQL queries and a relatively small attack surface with no identified unprotected entry points, significant concerns remain. The presence of two instances of the `unserialize` function is a critical risk, as deserialization vulnerabilities are notoriously dangerous and can lead to remote code execution if improperly handled. This is further compounded by the taint analysis revealing one flow with an unsanitized path, which could be exploited to bypass security controls or inject malicious data.
The vulnerability history also raises a red flag. With one known CVE, currently unpatched, and categorized as medium severity, it indicates a past pattern of security weaknesses. The common vulnerability type being Cross-site Scripting suggests that input sanitization and output escaping are areas that require diligent attention. Although the static analysis shows 44% of outputs are properly escaped, this figure is still concerning, and the unpatched CVE strongly suggests that the identified XSS vulnerability was not adequately addressed.
In conclusion, despite some positive security attributes like prepared SQL statements, the "invelity-sps-connect" plugin has notable weaknesses. The use of `unserialize`, the identified taint flow, and the unpatched CVE point to specific vulnerabilities that require immediate attention. The plugin needs a thorough review and remediation of these identified issues to improve its overall security.
Key Concerns
- Unpatched CVE
- Taint flow with unsanitized path
- Use of dangerous function: unserialize
- Low percentage of properly escaped output
- No capability checks
Invelity SPS connect Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Invelity SPS connect <= 1.0.8 - Reflected Cross-Site Scripting
Invelity SPS connect Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Invelity SPS connect Attack Surface
WordPress Hooks 8
Maintenance & Trust
Invelity SPS connect Maintenance & Trust
Maintenance Signals
Community Trust
Invelity SPS connect Alternatives
GLS Shipping for WooCommerce
gls-shipping-for-woocommerce
GLS Shipping plugin for WooCommerce
Invelity MyGLS connect
invelity-mygls-connect
Jednoduchý prenos objednávok do GLS cez API a tlač štítkov
Invelity GLS online connect
invelity-gls-online-connect
Plugin Invelity GLS online connect je vytvorený pre obchodníkov na platforme Woocommerce ktorý potrebuju automaticky exportovat údaje o objednávkach d …
Invelity GLS Connect
invelity-gls-connect
Plugin Invelity GLS connect je vytvorený pre obchodníkov na platforme Woocommerce ktorý potrebuju automaticky exportovat údaje o objednávkach do systé …
Weight Based Shipping Table Rate for WooCommerce – Flexible Shipping
flexible-shipping
Weight based shipping methods for WooCommerce. Flexible shipping with table rate rules by cart weight and order value. Accurate rates at checkout.
Invelity SPS connect Developer Profile
8 plugins · 380 total installs
How We Detect Invelity SPS connect
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/invelity-sps-connect/assets/css/invelity-plugins-main-admin.cssinvelity-plugins-main-admin-css?ver=1.0.0HTML / DOM Fingerprints
invelity-plugins-main-admin-cssinvelity-button