
Vendus Security & Risk Analysis
wordpress.org/plugins/vendusFaturação 100% online, sem dores de cabeça e sem sair da sua loja online! Programa nº 2230 certificado pela AT a partir de 4€ / mês.
Is Vendus Safe to Use in 2026?
Generally Safe
Score 85/100Vendus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "vendus" plugin v2.0 demonstrates a generally good security posture in several key areas, notably its lack of known vulnerabilities and robust handling of SQL queries with prepared statements. The plugin also excels in output escaping, with a high percentage of outputs properly sanitized. However, the static analysis reveals significant concerns that introduce potential risks.
The presence of the `unserialize` function twice without any apparent capability or nonce checks is a critical vulnerability. If user-controlled data is passed to `unserialize`, it can lead to Remote Code Execution (RCE) or other severe security issues. Furthermore, all identified taint flows have unsanitized paths, indicating a potential for various injection attacks if user input is not strictly validated and sanitized before being used in sensitive operations. The single external HTTP request also warrants attention, as it could be a vector for SSRF or data exfiltration if not properly secured.
While the vulnerability history is clean, which is a positive indicator, it doesn't negate the risks identified in the static analysis. The absence of historical vulnerabilities could simply mean these specific weaknesses haven't been exploited or discovered yet. In conclusion, "vendus" v2.0 has strengths in SQL handling and output escaping, but the critical risks associated with `unserialize` and unsanitized taint flows, coupled with a lack of authorization checks on these potentially dangerous functions, present a significant security weakness.
Key Concerns
- Dangerous function 'unserialize' used twice without auth/nonce
- All taint flows have unsanitized paths
- External HTTP request without clear security context
- No nonce checks on critical functions
- No capability checks on critical functions
Vendus Security Vulnerabilities
Vendus Release Timeline
Vendus Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Vendus Attack Surface
WordPress Hooks 20
Maintenance & Trust
Vendus Maintenance & Trust
Maintenance Signals
Community Trust
Vendus Alternatives
Client Invoicing by Sprout Invoices – Easy Estimates and Invoices for WordPress
sprout-invoices
The best invoicing plugin for WordPress. See how you can get paid faster without those hidden service fees.
WP Forms + Sprout Invoices – Easy Invoice & Quote Submissions
sprout-invoices-wp-forms
Dynamic invoicing (and estimates/quotes) from WP Form submissions.
Formidable Forms + Sprout Invoices – Easy Invoice & Estimate Submissions
sprout-invoices-formidable-forms
Dynamic invoicing (and estimates/quotes) from Formidable Form submissions.
TOConline for WooCommerce
toconline-for-woocommerce
TOConline for WooCommerce is a WordPress plugin that automates invoicing with TOConline.
Gravity Forms + Sprout Invoices – Easy Invoice & Estimate Submissions
sprout-invoices-gravity-forms
Dynamic invoicing (and estimates/quotes) from Gravity Form submissions.
Vendus Developer Profile
1 plugin · 200 total installs
How We Detect Vendus
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/vendus/assets/js/frontend.js/wp-content/plugins/vendus/assets/css/frontend.css/wp-content/plugins/vendus/assets/js/frontend.jsHTML / DOM Fingerprints
data-nifdata-nif-labeldata-nif-placeholderdata-nif-requireddata-nif-maxlengthdata-nif-validatevendus_plugin_vars/wp-json/vendus/v1/customers/get<div class="vendus_plugin_wrapper">
<input type="hidden" name="vendus_plugin_nonce" value="