
PostaPanduri Security & Risk Analysis
wordpress.org/plugins/postapanduriLivrarionline is a complete online ERP solution for courier services & distribution companies.
Is PostaPanduri Safe to Use in 2026?
Generally Safe
Score 98/100PostaPanduri has a strong security track record. Known vulnerabilities have been patched promptly.
The "postapanduri" v2.1.4 plugin exhibits a concerning security posture, primarily due to a significantly large and unprotected attack surface. With 15 AJAX handlers, all of which lack authentication checks, an attacker could potentially exploit these entry points without prior authorization. While the plugin shows a decent effort in using prepared statements for SQL queries (81%), the presence of one unsanitized path identified in taint analysis, even if not classified as critical or high severity, warrants attention. Furthermore, the plugin has a history of a high-severity vulnerability related to SQL injection, indicating a past weakness that could resurface if not adequately addressed in subsequent development.
While the plugin demonstrates some good practices like a substantial number of nonce checks (10) and capability checks (5), these are overshadowed by the unprotected AJAX endpoints. The 43% of output escaping also suggests room for improvement in preventing potential cross-site scripting (XSS) vulnerabilities. The past high-severity SQL injection vulnerability is a significant red flag, even though it's currently patched. This history, combined with the large number of unprotected AJAX handlers, presents a substantial risk to websites using this plugin. A balanced conclusion would be that while some security fundamentals are present, the plugin's exposed attack surface and past vulnerability history create a significant risk profile.
Key Concerns
- 15 unprotected AJAX handlers
- 1 unsanitized taint flow
- 43% properly escaped output
- 1 historical high severity CVE (SQLi)
- 5 capability checks found
- 10 nonce checks found
PostaPanduri Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
PostaPanduri <= 2.1.3 - Unauthenticated SQL Injection
PostaPanduri Code Analysis
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
PostaPanduri Attack Surface
AJAX Handlers 15
WordPress Hooks 34
Scheduled Events 1
Maintenance & Trust
PostaPanduri Maintenance & Trust
Maintenance Signals
Community Trust
PostaPanduri Alternatives
WooCommerce
woocommerce
Everything you need to launch an online store in days and keep it growing for years. From your first sale to millions in revenue, Woo is with you.
Popup Builder & Popup Maker for WordPress – OptinMonster Email Marketing and Lead Generation
optinmonster
🤩 Make popups & optin forms to get more email newsletter subscribers, leads, and sales - #1 most popular popup builder plugin! 🚀
WooCommerce PayPal Payments
woocommerce-paypal-payments
PayPal's latest payment processing solution. Accept PayPal, Pay Later, credit/debit cards, alternative digital wallets and bank accounts.
Mailchimp for WooCommerce
mailchimp-for-woocommerce
Connect your store to your Mailchimp audience to track sales, create targeted emails, send abandoned cart emails, and more.
PrettyLinks – Affiliate Links, Link Branding, Link Tracking, Marketing and Stripe Payments Plugin
pretty-link
🌠 The best WordPress link management, branding, tracking, sharing and payments plugin. Easily make pretty & trackable shortlinks. 🔗
PostaPanduri Developer Profile
2 plugins · 730 total installs
How We Detect PostaPanduri
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/postapanduri/inc/admin/css/postapanduri-admin.css/wp-content/plugins/postapanduri/inc/admin/js/postapanduri-admin-ajax.js/wp-content/plugins/postapanduri/inc/admin/js/postapanduri-admin.js/wp-content/plugins/postapanduri/inc/admin/js/postapanduri-admin-ajax.js/wp-content/plugins/postapanduri/inc/admin/js/postapanduri-admin.jspostapanduri-admin.css?ver=postapanduri-admin-ajax.js?ver=postapanduri-admin.js?ver=HTML / DOM Fingerprints
data-nonce-urlppaadmin