OurivesWeb Api Security & Risk Analysis

wordpress.org/plugins/ourivesweb-api

O Ourives Web é um produto com a qualidade da PONTO 25 – informática lda.

0 active installs v1.1.1 PHP 7.3+ WP 5.2+ Updated Unknown
encomendasfaturacaoinvoicingorders
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is OurivesWeb Api Safe to Use in 2026?

Generally Safe

Score 100/100

OurivesWeb Api has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The ouivresweb-api plugin version 1.1.1 demonstrates a generally strong security posture with some notable areas for improvement. The plugin excels in limiting its attack surface, with no unprotected AJAX handlers, REST API routes, or shortcodes. Its extensive use of prepared statements for SQL queries (92%) and proper output escaping (75%) are positive indicators of secure coding practices. Furthermore, the absence of any recorded vulnerabilities or CVEs suggests a history of reliable security.

However, the analysis does reveal potential weaknesses. The presence of a single cron event without explicit mention of authentication checks raises a flag. More significantly, a taint analysis identified one flow with an unsanitized path. While no critical or high severity issues were detected in the taint analysis, this indicates a potential for path traversal or similar vulnerabilities if not handled carefully. The plugin also lacks nonce checks on any entry points, which is a common security control for WordPress plugins. The limited number of capability checks (2) alongside the cron event and unsanitized path could potentially allow unauthorized access or execution if combined with other weaknesses or misconfigurations.

In conclusion, ouivresweb-api v1.1.1 is a relatively secure plugin, particularly in its handling of database interactions and output. Its clean vulnerability history is a significant strength. Nevertheless, the identified unsanitized path flow and the absence of nonce checks warrant attention to prevent potential security incidents, especially concerning the cron event's security.

Key Concerns

  • Unsanitized path flow detected
  • No nonce checks on entry points
  • Potential risk with cron event security
  • Output escaping is not fully robust (25% not properly escaped)
Vulnerabilities
None known

OurivesWeb Api Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

OurivesWeb Api Code Analysis

Dangerous Functions
0
Raw SQL Queries
5
56 prepared
Unescaped Output
30
89 escaped
Nonce Checks
0
Capability Checks
2
File Operations
15
External Requests
0
Bundled Libraries
0

SQL Query Safety

92% prepared61 total queries

Output Escaping

75% escaped119 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<report> (src\Views\report.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

OurivesWeb Api Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actionplugins_loadedourivesweb.php:58
actionadmin_enqueue_scriptsourivesweb.php:60
actionadmin_menusrc\Activators\Admin.php:12
actionadmin_bar_menusrc\Activators\Admin.php:13
actionproduct_cat_edit_form_fieldssrc\Helper\Cat_meta_data.php:20
actionproduct_cat_add_form_fieldssrc\Helper\Cat_meta_data.php:21
actionedited_product_catsrc\Helper\Cat_meta_data.php:22
actioncreate_product_catsrc\Helper\Cat_meta_data.php:23
actionwoocommerce_update_productsrc\Plugin.php:144
actionwoocommerce_update_productsrc\Plugin.php:170
actionourivesweb_woocommerce_products_syncsrc\Plugin.php:172
actionwoocommerce_order_status_changedsrc\Plugin.php:180

Scheduled Events 1

ourivesweb_woocommerce_products_sync
Maintenance & Trust

OurivesWeb Api Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedUnknown
PHP min version7.3
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

OurivesWeb Api Developer Profile

Ponto25

3 plugins · 10 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect OurivesWeb Api

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ourivesweb-api/assets/css/Error.css/wp-content/plugins/ourivesweb-api/assets/Includes/sweetalert2.all.min.js
Script Paths
/wp-content/plugins/ourivesweb-api/assets/Includes/sweetalert2.all.min.js
Version Parameters
ourivesweb-api/assets/css/Error.css?ver=ourivesweb-api/assets/Includes/sweetalert2.all.min.js?ver=

HTML / DOM Fingerprints

JS Globals
Swal
FAQ

Frequently Asked Questions about OurivesWeb Api