zipaddr-jp Security & Risk Analysis

wordpress.org/plugins/zipaddr-jp

zipaddr-jp is a collaborative tool that automatically inputs addresses from postal codes.

50K active installs v1.42 PHP + WP 3.7+ Updated Jan 12, 2026
addressajaxcross-domainzipzipaddr
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is zipaddr-jp Safe to Use in 2026?

Generally Safe

Score 100/100

zipaddr-jp has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The zipaddr-jp plugin version 1.42 exhibits a generally strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the adherence to prepared statements for all SQL queries and proper output escaping demonstrates good development practices. The single nonce check, while present, is a positive indicator, although the complete lack of capability checks on any entry points is a notable weakness that could allow unauthorized actions if an entry point were discovered or created.

The static analysis did identify two dangerous 'unserialize' function calls, and importantly, these 'unserialize' calls were part of flows with unsanitized paths. While the taint analysis did not flag these as critical or high severity, the use of 'unserialize' on potentially untrusted data is inherently risky and can lead to remote code execution vulnerabilities if not handled with extreme care and strict input validation. The plugin's history of zero known vulnerabilities is a positive sign, suggesting a diligent approach to security in the past, but it does not negate the inherent risks identified in the code.

In conclusion, while the plugin benefits from a small attack surface and sound practices in SQL and output handling, the presence of unsanitized 'unserialize' calls represents a significant potential risk. The lack of capability checks on any entry points further exacerbates this, creating a scenario where an attacker could potentially exploit the 'unserialize' functionality if they could trigger it. The plugin has a good foundation but requires careful review and mitigation for the identified 'unserialize' flows.

Key Concerns

  • Unsanitized path in unserialize flow
  • Unsanitized path in unserialize flow
  • Dangerous function: unserialize
  • No capability checks on entry points
Vulnerabilities
None known

zipaddr-jp Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

zipaddr-jp Release Timeline

v1.42Current
v1.41
v1.40
v1.39
v1.38
v1.37
v1.36
v1.35
v1.34
v1.33
v1.32
v1.31
v1.30
v1.29
v1.28
v1.27
v1.26
v1.25
v1.24
v1.0.1
Code Analysis
Analyzed Mar 16, 2026

zipaddr-jp Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
0
6 escaped
Nonce Checks
1
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$param= unserialize( get_option(zipaddr_DEFINE) ); // get定義情報admin.php:80
unserialize$param= @unserialize( get_option(zipaddr_DEFINE) ); // get定義情報zipaddr.php:5

Output Escaping

100% escaped6 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
zipaddr_jp_change (zipaddr.php:3)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

zipaddr-jp Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterusces_filter_apply_admin_addressformzipaddr-jp.php:35
actionadmin_menuzipaddr-jp.php:41
filterusces_filter_apply_addressformzipaddr-jp.php:47
filterusces_filter_cart_delivery_scriptzipaddr-jp.php:48
filterthe_contentzipaddr-jp.php:49
Maintenance & Trust

zipaddr-jp Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 12, 2026
PHP min version
Downloads400K

Community Trust

Rating100/100
Number of ratings6
Active installs50K
Developer Profile

zipaddr-jp Developer Profile

ta_terunuma

4 plugins · 50K total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect zipaddr-jp

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/zipaddr-jp/js/zipaddr.js/wp-content/plugins/zipaddr-jp/css/zipaddr.css
Script Paths
https://zipaddr.com/js/zipaddr7.js?v=1.42https://zipaddr.github.io/zipaddr3.js?v=1.42https://zipaddr.github.io/zipaddr30.js?v=1.42https://zipaddr.github.io/zipaddrx.js?v=1.42https://zipaddr.github.io/zipaddra.js?v=1.42
Version Parameters
zipaddr-jp/style.css?ver=zipaddr.js?v=1.42

HTML / DOM Fingerprints

CSS Classes
zipaddr-formzipaddr-inputzipaddr-buttonzipaddr-label
HTML Comments
<!-- ZIPADDRJP Start --><!-- ZIPADDRJP End --><!-- Contact Form 7 --><!-- MW WP Form -->+15 more
Data Attributes
data-zipaddr-targetdata-zipaddr-buttondata-zipaddr-zipdata-zipaddr-prefdata-zipaddr-citydata-zipaddr-town+1 more
JS Globals
zipaddr_ownbzipaddr_dataZipdelivery_countrydelivery_pref
Shortcode Output
[zipcode]
FAQ

Frequently Asked Questions about zipaddr-jp