Accounting for WooCommerce Security & Risk Analysis

wordpress.org/plugins/accounting-for-woocommerce

All you need to transfer accounting data from Woocommerce to accounting softwares!

600 active installs v1.6.11 PHP 7.4+ WP 5.3+ Updated Dec 4, 2025
accountingbookkeepingexportvatwoocommerce
95
A · Safe
CVEs total3
Unpatched0
Last CVEMar 27, 2025
Download
Safety Verdict

Is Accounting for WooCommerce Safe to Use in 2026?

Generally Safe

Score 95/100

Accounting for WooCommerce has a strong security track record. Known vulnerabilities have been patched promptly.

3 known CVEsLast CVE: Mar 27, 2025Updated 4mo ago
Risk Assessment

The "accounting-for-woocommerce" plugin v1.6.11 exhibits a mixed security posture. On the positive side, the static analysis reveals a clean attack surface with no identified entry points and a strong reliance on prepared statements for SQL queries. Furthermore, a significant portion of output is properly escaped, and nonce and capability checks are present. However, several concerning signals emerge. The presence of file operations coupled with unsanitized paths in the taint analysis suggests potential risks, although no critical or high severity flows were directly identified in this specific analysis. This warrants careful investigation of how file paths are handled. The plugin's vulnerability history is a significant concern, with three previously disclosed CVEs, including one critical vulnerability. The types of past vulnerabilities, such as Remote File Inclusion and Cross-Site Scripting, indicate historical weaknesses in input validation and file handling. While no vulnerabilities are currently unpatched, the recurring nature of these issues suggests a need for more robust and proactive security measures within the development lifecycle.

Overall, while the current static analysis of v1.6.11 shows improvements in certain areas like SQL handling and a controlled attack surface, the historical vulnerability data, particularly the critical CVE and the types of past exploits, temper the confidence in its security. The combination of past critical issues and potential unsanitized paths in file operations presents a moderate to high-risk profile. Future development should prioritize addressing the root causes of past vulnerabilities and ensuring all file operations are rigorously secured against path traversal and include vulnerabilities. Developers should also focus on further improving output escaping to reach 100% coverage and ensure comprehensive sanitization for all user-controlled inputs that influence file operations.

Key Concerns

  • Unsanitized paths in taint flows
  • File operations present
  • Previous critical CVE (unpatched history)
  • Previous medium CVEs (unpatched history)
  • Output escaping not 100%
Vulnerabilities
3

Accounting for WooCommerce Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
2 CVEs in 2025
2025
Patched Has unpatched

Severity Breakdown

Critical
1
Medium
2

3 total CVEs

CVE-2025-30835critical · 9.8Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')

Accounting for WooCommerce <= 1.6.8 - Unauthenticated Local File Inclusion

Mar 27, 2025 Patched in 1.6.9 (8d)
CVE-2025-26929medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Accounting for WooCommerce <=1.6.8 - Authenticated (Administrator+) Stored Cross-Site Scripting

Mar 11, 2025 Patched in 1.6.9 (7d)
CVE-2024-11324medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Accounting for WooCommerce <= 1.6.6 - Reflected Cross-Site Scripting

Dec 4, 2024 Patched in 1.6.7 (1d)
Code Analysis
Analyzed Mar 16, 2026

Accounting for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
24
126 escaped
Nonce Checks
2
Capability Checks
2
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

84% escaped150 total outputs
Data Flows
5 unsanitized

Data Flow Analysis

7 flows5 with unsanitized paths
woocommerce_accounting_export_data (inc\export.php:17)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Accounting for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
actionadmin_initinc\columns-mapping.php:4
actionadmin_initinc\settings.php:3
actionwoocommerce_settings_save_accountinginc\settings.php:4
actionload-woocommerce_page_wc-settingsinc\settings.php:7
filterwoocommerce_settings_tabs_arrayinc\settings.php:8
filterwoocommerce_get_sections_accountinginc\settings.php:10
actionwoocommerce_sections_accountinginc\settings.php:12
actionwoocommerce_settings_accountinginc\settings.php:13
filterwoocommerce_accounting:settings:save:woocommerce_accounting_colorderinc\settings.php:15
actioninitwoocommerce-accounting.php:31
actionadmin_initwoocommerce-accounting.php:44
actionadmin_menuwoocommerce-accounting.php:45
actionadmin_post_woocommerce_accounting_exportwoocommerce-accounting.php:48
actionadmin_post_woocommerce_accounting_refunds_exportwoocommerce-accounting.php:49
filterplugin_row_metawoocommerce-accounting.php:53
actionwoocommerce_accounting:export_form:before_titlewoocommerce-accounting.php:218
Maintenance & Trust

Accounting for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 4, 2025
PHP min version7.4
Downloads11K

Community Trust

Rating60/100
Number of ratings2
Active installs600
Developer Profile

Accounting for WooCommerce Developer Profile

Bastien Ho

12 plugins · 2K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
15 days
View full developer profile
Detection Fingerprints

How We Detect Accounting for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/accounting-for-woocommerce/assets/jquery-ui.css

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Accounting for WooCommerce