All in One Woo Security & Risk Analysis

wordpress.org/plugins/all-in-one-woo

This plugin helps you customize WooCommerce without writing any code! All in One Woo plugin allows WordPress/WooCommerce admin to rename the default l …

10 active installs v1.0.3 PHP + WP 4.1+ Updated Dec 1, 2020
salesellwoocommercewoocommerce-filterswoocommerce-shop
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is All in One Woo Safe to Use in 2026?

Generally Safe

Score 85/100

All in One Woo has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The static analysis of "all-in-one-woo" v1.0.3 reveals a plugin with no identified attack surface, dangerous functions, or SQL injection vulnerabilities. The complete absence of shortcodes, AJAX handlers, REST API routes, cron events, and file operations is a strong indicator of a well-contained plugin, minimizing potential entry points for attackers. The plugin also adheres to secure coding practices by exclusively using prepared statements for SQL queries.

However, a significant concern arises from the output escaping analysis, where only 44% of outputs are properly escaped. This indicates a potential for Cross-Site Scripting (XSS) vulnerabilities, as unsanitized data could be rendered directly in the browser. Furthermore, the complete lack of nonce and capability checks, particularly in the context of an unspecified number of output operations, represents a significant weakness. While no direct attack vectors were found in taint analysis, the potential for XSS due to poor output sanitization coupled with the absence of authentication and authorization checks could be exploited if any of the output operations are tied to user-provided data.

The plugin's vulnerability history is exceptionally clean, with no recorded CVEs. This suggests a history of responsible development and maintenance, or perhaps a lack of widespread historical scrutiny. While a clean history is positive, it should not overshadow the identified security weaknesses in the current version. The primary risk stems from the high percentage of unescaped output and the lack of authorization/nonce checks, which could lead to XSS vulnerabilities if user input is involved in any of the output operations. The plugin's strengths lie in its minimal attack surface and secure SQL practices, but its weaknesses in output sanitization and authorization require attention.

Key Concerns

  • Insufficient output escaping (44% proper)
  • No nonce checks detected
  • No capability checks detected
Vulnerabilities
None known

All in One Woo Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

All in One Woo Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
19
15 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

44% escaped34 total outputs
Attack Surface

All in One Woo Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 33
actionplugins_loadedall-in-one-woo.php:36
actionadmin_noticesall-in-one-woo.php:41
actionadmin_initall-in-one-woo.php:48
actionadmin_enqueue_scriptsall-in-one-woo.php:49
actionadmin_menuall-in-one-woo.php:50
filterwoocommerce_product_add_to_cart_textall-in-one-woo.php:51
filterwoocommerce_product_single_add_to_cart_textall-in-one-woo.php:52
filterwoocommerce_booking_single_add_to_cart_textall-in-one-woo.php:53
filtergettextall-in-one-woo.php:54
filterwoocommerce_shipping_package_nameall-in-one-woo.php:55
filterwc_empty_cart_messageall-in-one-woo.php:56
filterwoocommerce_return_to_shop_redirectall-in-one-woo.php:57
filterwc_product_sku_enabledall-in-one-woo.php:58
actionwoocommerce_after_single_product_summaryall-in-one-woo.php:59
actionwoocommerce_single_product_summaryall-in-one-woo.php:60
filterwoocommerce_product_tabsall-in-one-woo.php:62
filterwoocommerce_product_tabsall-in-one-woo.php:63
filterwoocommerce_product_data_tabsall-in-one-woo.php:66
actionwoocommerce_product_data_panelsall-in-one-woo.php:68
actionwoocommerce_process_product_metaall-in-one-woo.php:70
filterwoocommerce_sale_flashall-in-one-woo.php:75
filterwoocommerce_get_availabilityall-in-one-woo.php:77
filterwoocommerce_checkout_fieldsall-in-one-woo.php:79
filterwoocommerce_default_address_fieldsall-in-one-woo.php:81
actionwoocommerce_admin_order_data_after_shipping_addressall-in-one-woo.php:83
actionwoocommerce_admin_order_data_after_billing_addressall-in-one-woo.php:85
actionwp_headall-in-one-woo.php:87
actionwoocommerce_register_form_startall-in-one-woo.php:90
actionwoocommerce_created_customerall-in-one-woo.php:91
actionwoocommerce_thankyouall-in-one-woo.php:94
actionadmin_headall-in-one-woo.php:96
actionwoocommerce_after_single_product_summaryall-in-one-woo.php:347
actionwoocommerce_single_product_summaryall-in-one-woo.php:360
Maintenance & Trust

All in One Woo Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedDec 1, 2020
PHP min version
Downloads1K

Community Trust

Rating46/100
Number of ratings3
Active installs10
Developer Profile

All in One Woo Developer Profile

Zakir Sajib

2 plugins · 20 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect All in One Woo

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/all-in-one-woo/public/css/css.php/wp-content/plugins/all-in-one-woo/public/css/style.css/wp-content/plugins/all-in-one-woo/public/js/all-in-one-woo.js/wp-content/plugins/all-in-one-woo/public/js/wp-color-picker-script.js

HTML / DOM Fingerprints

CSS Classes
allinone_tab_optionsallinone_tab_tab
Data Attributes
id="allinonewoo"name="form"
JS Globals
window.all_in_one_woo_color
FAQ

Frequently Asked Questions about All in One Woo