ACF viewer for WooCommerce Security & Risk Analysis

wordpress.org/plugins/acf-viewer-for-woocommerce

Advanced Custom Fields viewer for WooCommerce

20 active installs v1.0.1 PHP + WP 4.9+ Updated Aug 3, 2021
acfacf-for-woocommerceacf-woocommerce-vieweradvanced-custom-fieldswoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is ACF viewer for WooCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

ACF viewer for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The 'acf-viewer-for-woocommerce' v1.0.1 plugin exhibits a generally strong security posture based on the provided static analysis. It effectively utilizes prepared statements for all SQL queries and demonstrates a high percentage of properly escaped output, mitigating common risks like SQL injection and Cross-Site Scripting (XSS). The presence of nonce checks and capability checks on entry points further strengthens its defenses. The complete absence of known vulnerabilities in its history is also a positive indicator of responsible development.

However, a notable concern is the presence of the `unserialize` function. While there are no directly observable taint flows indicating immediate risk from this function in the analyzed code, `unserialize` is inherently dangerous as it can lead to Remote Code Execution (RCE) or other vulnerabilities if used with untrusted input. The limited number of analyzed flows and the absence of documented past vulnerabilities don't entirely negate this potential risk. The attack surface is small and appears to be protected, but the underlying danger of `unserialize` warrants caution.

In conclusion, the plugin follows many good security practices, particularly in its handling of database queries and output. The lack of historical vulnerabilities is reassuring. The primary weakness lies in the potential risk associated with `unserialize`, which, despite not being actively exploited in the current analysis, represents a significant theoretical attack vector. Further analysis of how `unserialize` is used and what data sources it processes would be beneficial.

Key Concerns

  • Use of dangerous unserialize function
Vulnerabilities
None known

ACF viewer for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ACF viewer for WooCommerce Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
21
152 escaped
Nonce Checks
4
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$awv_feild_items = unserialize( $box_options['awv_feild_item'][0] );include\helper-functions.php:461

Output Escaping

88% escaped173 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
awv_get_field_buttons (include\helper-functions.php:22)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

ACF viewer for WooCommerce Attack Surface

Entry Points4
Unprotected0

AJAX Handlers 2

authwp_ajax_awv_get_field_buttonsinclude\helper-functions.php:32
authwp_ajax_awv_get_field_rowinclude\helper-functions.php:59

Shortcodes 2

[awv_field] include\shortcodes.php:56
[awv_box] include\shortcodes.php:83
WordPress Hooks 19
filterviews_edit-awv_boxacf-woocommerce-viewer.php:43
actionadmin_noticesacf-woocommerce-viewer.php:47
actionadd_meta_boxes_awv_boxinclude\admin.php:8
actionsave_post_awv_boxinclude\admin.php:9
actionadmin_enqueue_scriptsinclude\admin.php:10
filtermanage_awv_box_posts_columnsinclude\helper-functions.php:574
actionmanage_awv_box_posts_custom_columninclude\helper-functions.php:588
actionwpinclude\helper-functions.php:661
actionwp_enqueue_scriptsinclude\helper-functions.php:673
actioninitinclude\post_type.php:53
actionadmin_menuinclude\settings.php:8
actionadmin_initinclude\settings.php:14
actionwidgets_initinclude\widget.php:103
filtersacfvt_box_positionstester\plugins.php:101
actionwp_footertester\tester.php:14
actionwp_enqueue_scriptstester\tester.php:15
actionwptester\tester.php:16
actionwptester\tester.php:17
actionwoocommerce_product_tabstester\tester.php:18
Maintenance & Trust

ACF viewer for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.0
Last updatedAug 3, 2021
PHP min version
Downloads2K

Community Trust

Rating74/100
Number of ratings3
Active installs20
Developer Profile

ACF viewer for WooCommerce Developer Profile

olezhyk5

2 plugins · 120 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ACF viewer for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/acf-viewer-for-woocommerce/include/admin.js/wp-content/plugins/acf-viewer-for-woocommerce/include/admin.css/wp-content/plugins/acf-viewer-for-woocommerce/include/style.css
Script Paths
/wp-content/plugins/acf-viewer-for-woocommerce/include/admin.js
Version Parameters
acf-viewer-for-woocommerce/include/admin.js?ver=acf-viewer-for-woocommerce/include/admin.css?ver=acf-viewer-for-woocommerce/include/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
awv-free-noticejs-awv-tablehidden-rowline-elmnsacfv-fields-wrapper
HTML Comments
<!-- Main box fields -->
Data Attributes
data-selected
JS Globals
awv_data
FAQ

Frequently Asked Questions about ACF viewer for WooCommerce