Laposta Signup Basic Security & Risk Analysis

wordpress.org/plugins/laposta-signup-basic

Laposta is a Dutch email marketing tool. Load your Laposta lists and render fields in a HTML form with custom styling.

2K active installs v3.2.5 PHP 7.1+ WP 4.7+ Updated Feb 24, 2026
formgdprlapostamarketingnewsletters
99
A · Safe
CVEs total2
Unpatched0
Last CVESep 5, 2023
Safety Verdict

Is Laposta Signup Basic Safe to Use in 2026?

Generally Safe

Score 99/100

Laposta Signup Basic has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Sep 5, 2023Updated 1mo ago
Risk Assessment

The 'laposta-signup-basic' v3.2.5 plugin exhibits a mixed security posture. On the positive side, the static analysis indicates a strong adherence to secure coding practices in several key areas. There are no identified dangerous functions, all SQL queries utilize prepared statements, and there are no external HTTP requests, which minimizes potential attack vectors. The limited number of file operations and the presence of some nonce and capability checks are also encouraging signs. However, a significant concern arises from the low percentage of properly escaped output (46%), indicating a substantial risk of Cross-Site Scripting (XSS) vulnerabilities where user-supplied data might be rendered without adequate sanitization.

The plugin's vulnerability history, with two known medium-severity CVEs, both of which were Cross-Site Request Forgery (CSRF) issues, and the most recent occurring in September 2023, suggests a pattern of past security weaknesses. While there are currently no unpatched vulnerabilities, the history of CSRF indicates that user input and actions may not always be adequately protected against malicious manipulation. The lack of any identified taint flows or unsanitized paths in the current static analysis is a positive, but it does not negate the past findings or the concerns raised by output escaping.

In conclusion, 'laposta-signup-basic' v3.2.5 shows promise with its secure SQL handling and absence of external requests. However, the high proportion of unescaped output is a critical weakness that needs immediate attention to prevent XSS. The historical pattern of CSRF vulnerabilities also warrants vigilance. While the current static analysis doesn't reveal critical or high-severity issues in taint flows, the overall risk is elevated due to the output escaping deficiencies and past vulnerability history.

Key Concerns

  • Low percentage of properly escaped output (46%)
  • Two medium-severity CVEs in vulnerability history
  • Historical pattern of CSRF vulnerabilities
Vulnerabilities
2

Laposta Signup Basic Security Vulnerabilities

CVEs by Year

2 CVEs in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

WF-b7e417c2-bf9c-4c88-be2b-9c2324897b07-laposta-signup-basicmedium · 4.3Cross-Site Request Forgery (CSRF)

Laposta Signup Basic <= 1.4.1 - Missing Authorization

Sep 5, 2023 Patched in 1.4.2 (140d)
CVE-2023-41950medium · 4.3Cross-Site Request Forgery (CSRF)

Laposta Signup Basic <= 1.4.1 - Cross-Site Request Forgery

Sep 5, 2023 Patched in 1.4.2 (140d)
Code Analysis
Analyzed Mar 16, 2026

Laposta Signup Basic Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
144
123 escaped
Nonce Checks
2
Capability Checks
0
File Operations
4
External Requests
0
Bundled Libraries
0

Output Escaping

46% escaped267 total outputs
Attack Surface

Laposta Signup Basic Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initsrc\Plugin.php:115
actioninitsrc\Plugin.php:119
actionplugins_loadedsrc\Plugin.php:120
actionadmin_menusrc\Service\AdminMenu.php:41
actionadmin_headsrc\Service\AdminMenu.php:42
Maintenance & Trust

Laposta Signup Basic Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 24, 2026
PHP min version7.1
Downloads39K

Community Trust

Rating100/100
Number of ratings2
Active installs2K
Developer Profile

Laposta Signup Basic Developer Profile

stijnvanderree

3 plugins · 4K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
114 days
View full developer profile
Detection Fingerprints

How We Detect Laposta Signup Basic

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/laposta-signup-basic/assets/css/form.css/wp-content/plugins/laposta-signup-basic/assets/css/loader.css/wp-content/plugins/laposta-signup-basic/assets/js/form.js
Script Paths
/wp-content/plugins/laposta-signup-basic/assets/js/form.js
Version Parameters
laposta-signup-basic/assets/css/form.css?ver=laposta-signup-basic/assets/css/loader.css?ver=laposta-signup-basic/assets/js/form.js?ver=

HTML / DOM Fingerprints

CSS Classes
lsb-formlsb-form-bodylsb-form-field-wrapperlsb-form-field-has-errorlsb-form-input-has-errorlsb-form-field-error-feedbacklsb-form-labellsb-form-label-name+11 more
HTML Comments
<!-- START Laposta Signup Basic Form --><!-- END Laposta Signup Basic Form -->
Data Attributes
data-list-iddata-nonce-namedata-error-message-requireddata-error-message-validdata-thank-you-messagedata-error-message-honeypot+4 more
JS Globals
LapostaSignupBasic
REST Endpoints
/wp-json/laposta-signup-basic/v1/submit
Shortcode Output
[laposta_signup_form]
FAQ

Frequently Asked Questions about Laposta Signup Basic