Amazing WP e-Commerce Security & Risk Analysis

wordpress.org/plugins/amazing-wp-e-commerce

Enable some of the WP e-Commerce disabled features and simplify your development.

10 active installs v1.0.1 PHP + WP 3.0.1+ Updated Unknown
wp-e-commercewpecwpsc
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Amazing WP e-Commerce Safe to Use in 2026?

Generally Safe

Score 100/100

Amazing WP e-Commerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "amazing-wp-e-commerce" v1.0.1 plugin presents a significant security risk due to a poorly implemented attack surface. While it shows good practices in avoiding dangerous functions, raw SQL queries, and external HTTP requests, its handling of entry points is concerning. All four identified AJAX handlers lack authentication checks, creating a wide open avenue for potential exploits. Furthermore, the plugin suffers from a complete lack of output escaping for all 16 identified output points, meaning any user-controlled data displayed could be vulnerable to cross-site scripting (XSS) attacks.

The taint analysis reveals four flows with unsanitized paths, which, combined with the lack of output escaping, strongly suggests a high risk of XSS vulnerabilities. The absence of nonce checks on AJAX handlers exacerbates this risk. Despite the plugin having no recorded vulnerability history, this data point alone does not indicate strong security; it may simply reflect a lack of widespread discovery or a less scrutinized plugin.

In conclusion, the plugin's strengths in SQL query handling and avoiding certain dangerous functions are overshadowed by critical weaknesses in authentication, output sanitization, and overall attack surface management. The significant number of unprotected AJAX handlers and universally unescaped outputs are major security concerns that require immediate attention.

Key Concerns

  • Unprotected AJAX handlers
  • No output escaping
  • Unsanitized paths in taint flows
  • No nonce checks on AJAX
Vulnerabilities
None known

Amazing WP e-Commerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Amazing WP e-Commerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped16 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
get_amazing_ecommerce_images (amazing-ecommerce.php:487)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
4 unprotected

Amazing WP e-Commerce Attack Surface

Entry Points4
Unprotected4

AJAX Handlers 4

authwp_ajax_extra_product_imagesamazing-ecommerce.php:522
noprivwp_ajax_extra_product_imagesamazing-ecommerce.php:523
authwp_ajax_extra_product_imagestrunk\amazing-ecommerce.php:522
noprivwp_ajax_extra_product_imagestrunk\amazing-ecommerce.php:523
WordPress Hooks 6
actionwp_enqueue_scriptsamazing-ecommerce.php:519
actionwpsc_top_of_products_pageamazing-ecommerce.php:520
actionwpsc_theme_footeramazing-ecommerce.php:521
actionwp_enqueue_scriptstrunk\amazing-ecommerce.php:519
actionwpsc_top_of_products_pagetrunk\amazing-ecommerce.php:520
actionwpsc_theme_footertrunk\amazing-ecommerce.php:521
Maintenance & Trust

Amazing WP e-Commerce Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedUnknown
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Amazing WP e-Commerce Developer Profile

Risto Niinemets

4 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Amazing WP e-Commerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
gallery_images
Data Attributes
rel="thickbox"
FAQ

Frequently Asked Questions about Amazing WP e-Commerce