Advanced Coupon Conditions for Woocommerce Security & Risk Analysis

wordpress.org/plugins/advanced-coupon-conditions-for-woocommerce

Advanced Coupon Conditions for Woocommerce allows you to create coupons with advanced attributes.

10 active installs v1.0.1 PHP + WP 3.0.1+ Updated Jan 10, 2017
advancedconditioncouponwoocommercewoocommerce-coupon
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Advanced Coupon Conditions for Woocommerce Safe to Use in 2026?

Generally Safe

Score 85/100

Advanced Coupon Conditions for Woocommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "advanced-coupon-conditions-for-woocommerce" v1.0.1 plugin exhibits a mixed security posture. On the positive side, there are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface. This significantly reduces the number of potential entry points for attackers. Furthermore, the code does not utilize dangerous functions, perform file operations, make external HTTP requests, or use raw SQL queries; all SQL queries are prepared statements, which is a strong security practice. The absence of any recorded vulnerabilities or CVEs in its history is also a positive indicator, suggesting a history of stable and secure code.

However, there are notable areas of concern. The output escaping is only properly implemented for 40% of outputs, which means a significant portion of user-facing output may be vulnerable to Cross-Site Scripting (XSS) attacks. Additionally, the complete absence of nonce checks and capability checks across all potential entry points (though there are none identified) is a red flag. While the current lack of entry points mitigates immediate risk, any future additions or modifications to the plugin that introduce AJAX, REST API, or shortcodes without proper authentication and authorization checks could introduce severe vulnerabilities. The taint analysis also found no flows, which is positive, but this might be limited by the static analysis tool's capabilities or the plugin's simplicity.

In conclusion, while the plugin has a clean history and a minimal attack surface, the poor output escaping and lack of any security checks (nonces, capabilities) represent potential weaknesses. The developer should prioritize addressing the output escaping issues to prevent XSS vulnerabilities. Future development should incorporate robust security checks for any new entry points added.

Key Concerns

  • Low output escaping percentage
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Advanced Coupon Conditions for Woocommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Advanced Coupon Conditions for Woocommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

40% escaped15 total outputs
Attack Surface

Advanced Coupon Conditions for Woocommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 15
actionplugins_loadedincludes\class-dc-accfw.php:139
actionadmin_enqueue_scriptsincludes\class-dc-accfw.php:154
actionadmin_enqueue_scriptsincludes\class-dc-accfw.php:155
filterwoocommerce_api_coupon_responseincludes\class-dc-accfw.php:156
actionwoocommerce_api_create_couponincludes\class-dc-accfw.php:157
actionwoocommerce_api_edit_couponincludes\class-dc-accfw.php:158
actionwoocommerce_coupon_options_usage_restrictionincludes\class-dc-accfw.php:159
actionwoocommerce_coupon_options_saveincludes\class-dc-accfw.php:160
actionadmin_noticesincludes\class-dc-accfw.php:162
actionwp_enqueue_scriptsincludes\class-dc-accfw.php:178
actionwp_enqueue_scriptsincludes\class-dc-accfw.php:179
actionwoocommerce_coupon_loadedincludes\class-dc-accfw.php:180
filterwoocommerce_coupon_is_validincludes\class-dc-accfw.php:181
filterwoocommerce_coupon_errorincludes\class-dc-accfw.php:182
actionwoocommerce_after_checkout_formincludes\class-dc-accfw.php:183
Maintenance & Trust

Advanced Coupon Conditions for Woocommerce Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedJan 10, 2017
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Advanced Coupon Conditions for Woocommerce Developer Profile

dcurasi

3 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Advanced Coupon Conditions for Woocommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/advanced-coupon-conditions-for-woocommerce/admin/css/dc-accfw-admin.css/wp-content/plugins/advanced-coupon-conditions-for-woocommerce/admin/js/dc-accfw-admin.js
Script Paths
/wp-content/plugins/advanced-coupon-conditions-for-woocommerce/admin/js/dc-accfw-admin.js
Version Parameters
advanced-coupon-conditions-for-woocommerce/admin/css/dc-accfw-admin.css?ver=advanced-coupon-conditions-for-woocommerce/admin/js/dc-accfw-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
dc-accfw-admin
HTML Comments
<!-- This file is provided for demonstration purposes only. --><!-- An instance of this class should be passed to the run() function --><!-- defined in Dc_Accfw_Loader as all of the hooks are defined --><!-- in that particular class. -->+3 more
Data Attributes
data-payment_methodsdata-billing_countriesdata-shipping_countriesdata-zip_codesdata-pc_inc_exc
JS Globals
dc_accfw_ajax_object
FAQ

Frequently Asked Questions about Advanced Coupon Conditions for Woocommerce