La Poste : communes par codes postaux Security & Risk Analysis

wordpress.org/plugins/laposte-hexasmal

Saisie et vérification des codes postaux utilisant l'API de La Poste Hexasmal https://datanova.legroupe.laposte.fr/explore/dataset/hexasmal_cp/

60 active installs v1.4.4.2 PHP + WP 4.0+ Updated Oct 25, 2023
adressecode-postalla-posteverificationwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is La Poste : communes par codes postaux Safe to Use in 2026?

Generally Safe

Score 85/100

La Poste : communes par codes postaux has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The laposte-hexasmal plugin v1.4.4.2 exhibits a generally positive security posture based on the provided static analysis and vulnerability history. The absence of known CVEs and the consistent use of prepared statements for SQL queries are strong indicators of good development practices. Furthermore, the plugin demonstrates awareness of security by implementing nonce and capability checks, which are crucial for protecting against common attack vectors.

However, a significant concern arises from the output escaping. With only 5% of outputs properly escaped out of 21 total outputs, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. This means that user-supplied data, if not properly sanitized before being displayed, could be manipulated to inject malicious scripts, potentially compromising user sessions or spreading malware. The lack of any identified taint flows might be misleading due to the limited scope of analysis or the specific nature of the code, but the low output escaping rate is a concrete and serious weakness.

In conclusion, while the plugin benefits from a clean vulnerability history and sound SQL handling, the severe lack of output escaping presents a significant security risk. The plugin's strengths in other areas are overshadowed by this critical oversight, making it vulnerable to XSS attacks. Addressing the output escaping issue should be the immediate priority to improve its overall security.

Key Concerns

  • Insufficient output escaping (XSS risk)
Vulnerabilities
None known

La Poste : communes par codes postaux Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

La Poste : communes par codes postaux Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
20
1 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

5% escaped21 total outputs
Attack Surface

La Poste : communes par codes postaux Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[hexasmal_verification] hexasmal-shortcodes.php:2
WordPress Hooks 13
actionadmin_menuhexasmal-admin.php:2
actionwphexasmal_codes_postaux.php:53
actionwoocommerce_after_edit_address_form_billinghexasmal_codes_postaux.php:58
actionwoocommerce_after_edit_address_form_shippinghexasmal_codes_postaux.php:65
actionwoocommerce_after_shipping_calculatorhexasmal_codes_postaux.php:75
actionwoocommerce_after_checkout_shipping_formhexasmal_codes_postaux.php:83
actionwoocommerce_after_checkout_billing_formhexasmal_codes_postaux.php:91
actionwoocommerce_admin_order_data_after_billing_addresshexasmal_codes_postaux.php:100
actionwp_footerhexasmal_codes_postaux.php:109
actionadmin_inithexasmal_codes_postaux.php:113
actionwoocommerce_admin_order_data_after_billing_addresshexasmal_codes_postaux.php:118
actionwoocommerce_admin_order_data_after_shipping_addresshexasmal_codes_postaux.php:124
actionadmin_footerhexasmal_codes_postaux.php:129
Maintenance & Trust

La Poste : communes par codes postaux Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedOct 25, 2023
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs60
Developer Profile

La Poste : communes par codes postaux Developer Profile

malaiac

2 plugins · 4K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
289 days
View full developer profile
Detection Fingerprints

How We Detect La Poste : communes par codes postaux

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/laposte-hexasmal/hexasmal-javascript.js/wp-content/plugins/laposte-hexasmal/hexasmal-functions.js/wp-content/plugins/laposte-hexasmal/hexasmal-admin.js/wp-content/plugins/laposte-hexasmal/hexasmal-shortcodes.js
Version Parameters
/wp-content/plugins/laposte-hexasmal/hexasmal-javascript.js?ver=/wp-content/plugins/laposte-hexasmal/hexasmal-functions.js?ver=/wp-content/plugins/laposte-hexasmal/hexasmal-admin.js?ver=/wp-content/plugins/laposte-hexasmal/hexasmal-shortcodes.js?ver=

HTML / DOM Fingerprints

CSS Classes
hexasmal_formhexasmal_form_code_postalhexasmal_form_communehexasmal_response_selecthexasmal_extra_results
HTML Comments
<!-- hexasmal_codes_postaux.php --><!-- 1.4.3 libelle d'acheminement --><!-- 1.4.2 image + bump --><!-- 1.4 nom de champs ACF -->+12 more
Data Attributes
data-hexasmal-uniqiddata-hexasmal-add-stylesdata-hexasmal-code-postal-namedata-hexasmal-commune-namedata-hexasmal-country-namedata-hexasmal-create-form+1 more
JS Globals
hexasmal_cp_javascript
Shortcode Output
[hexasmal_verification]
FAQ

Frequently Asked Questions about La Poste : communes par codes postaux