pFacturas for WooCommerce Security & Risk Analysis

wordpress.org/plugins/pfacturas-for-woocommerce

Facturación electrónica automática (e-Ticket, e-Factura, notas de crédito) para Uruguay cumpliendo normativa DGI.

0 active installs v1.0.27.63 PHP 7.4+ WP 6.0+ Updated Jan 2, 2026
cfedgifacturacion-electronicauruguaywoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is pFacturas for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

pFacturas for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The plugin "pfacturas-for-woocommerce" v1.0.27.63 demonstrates a generally strong security posture based on the provided static analysis and vulnerability history. The absence of critical or high-severity vulnerabilities in its history is a significant positive indicator, suggesting a history of responsible development and patching. The code analysis further supports this, showing a robust implementation of security best practices. Notably, the plugin has no recorded CVEs, indicating a low historical risk. The static analysis reveals a small attack surface consisting of only two AJAX handlers, and crucially, all entry points appear to have proper authorization checks, which is excellent. The code also excels in output escaping (96% proper) and utilizes prepared statements exclusively for SQL queries, effectively mitigating common injection risks. The presence of nonce and capability checks further hardens its defenses. There are no concerning taint analysis results, with zero flows exhibiting unsanitized paths. However, while the current analysis shows no direct vulnerabilities, a minor area for attention could be the overall percentage of output escaping, as 4% unescaped output, although small, can still present a risk depending on the data involved. Given the strong historical and static analysis results, the overall risk is assessed as low.

Key Concerns

  • Minor percentage of unescaped output
Vulnerabilities
None known

pFacturas for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

pFacturas for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
88 escaped
Nonce Checks
1
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

96% escaped92 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<class-pf-emitter> (includes\class-pf-emitter.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

pFacturas for WooCommerce Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_pf_emit_cfeincludes\class-pf-emitter.php:163
authwp_ajax_pf_renovar_credenciales_demoincludes\class-pf-settings.php:21
WordPress Hooks 30
actionwp_enqueue_scriptsincludes\class-pf-blocks.php:8
actionwoocommerce_blocks_loadedincludes\class-pf-blocks.php:9
actionwoocommerce_store_api_checkout_update_order_from_requestincludes\class-pf-blocks.php:39
actionwoocommerce_after_order_notesincludes\class-pf-checkout.php:7
actionwoocommerce_checkout_processincludes\class-pf-checkout.php:8
actionwoocommerce_checkout_update_order_metaincludes\class-pf-checkout.php:9
actionwoocommerce_checkout_order_processedincludes\class-pf-checkout.php:10
actionwoocommerce_admin_order_data_after_billing_addressincludes\class-pf-checkout.php:11
actionwp_enqueue_scriptsincludes\class-pf-checkout.php:12
actionwoocommerce_order_status_processingincludes\class-pf-emitter.php:158
actionwoocommerce_order_status_completedincludes\class-pf-emitter.php:159
actionwoocommerce_new_orderincludes\class-pf-emitter.php:161
actionadd_meta_boxesincludes\class-pf-emitter.php:162
actionwoocommerce_admin_order_data_after_order_detailsincludes\class-pf-emitter.php:164
actionadmin_enqueue_scriptsincludes\class-pf-emitter.php:165
actionwp_enqueue_scriptsincludes\class-pf-emitter.php:166
actionwoocommerce_order_refundedincludes\class-pf-emitter.php:170
actionwoocommerce_refund_createdincludes\class-pf-emitter.php:171
actionwoocommerce_order_details_after_order_tableincludes\class-pf-emitter.php:175
actionwoocommerce_thankyouincludes\class-pf-emitter.php:176
actionwoocommerce_store_api_checkout_order_processedincludes\class-pf-emitter.php:183
actionwp_footerincludes\class-pf-emitter.php:186
actionadmin_menuincludes\class-pf-settings.php:12
actionadmin_initincludes\class-pf-settings.php:13
actionadmin_enqueue_scriptsincludes\class-pf-settings.php:14
actionadmin_noticespFacturas.php:41
actionupgrader_process_completepFacturas.php:58
filterdeprecated_hook_trigger_errorpFacturas.php:69
actionplugins_loadedpFacturas.php:79
actionbefore_woocommerce_initpFacturas.php:87
Maintenance & Trust

pFacturas for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 2, 2026
PHP min version7.4
Downloads103

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

pFacturas for WooCommerce Developer Profile

puntoexeconsultores

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect pFacturas for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pfacturas-for-woocommerce/assets/checkout.css/wp-content/plugins/pfacturas-for-woocommerce/assets/blocks.js
Script Paths
/wp-content/plugins/pfacturas-for-woocommerce/assets/blocks.js
Version Parameters
/wp-content/plugins/pfacturas-for-woocommerce/assets/checkout.css?ver=1.0.11.9/wp-content/plugins/pfacturas-for-woocommerce/assets/blocks.js?ver=1.0.11.9

HTML / DOM Fingerprints

JS Globals
PFBlocks
REST Endpoints
/wp-json/pfacturas/v1/checkout
FAQ

Frequently Asked Questions about pFacturas for WooCommerce