Avenir-soft Direct Download Security & Risk Analysis

wordpress.org/plugins/avenirsoft-directdownload

Download Button for WooCommerce Free, virtual and downloadable products.

10 active installs v1.0 PHP + WP 3.8+ Updated Jan 8, 2015
direct-downloaddownloaddownloadablewoocommerce-download-buttonwordpress-woocommerce
64
C · Use Caution
CVEs total1
Unpatched1
Last CVEAug 6, 2015
Safety Verdict

Is Avenir-soft Direct Download Safe to Use in 2026?

Use With Caution

Score 64/100

Avenir-soft Direct Download has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Aug 6, 2015Updated 11yr ago
Risk Assessment

The 'avenirsoft-directdownload' plugin version 1.0 exhibits a mixed security posture. On the positive side, the static analysis indicates a remarkably small attack surface with no detectable AJAX handlers, REST API routes, shortcodes, or cron events that are exposed. Furthermore, all SQL queries are confirmed to use prepared statements, which is a strong security practice. However, several significant concerns are raised by the analysis. The plugin fails to implement any nonce checks or capability checks, leaving potential entry points (if they existed) vulnerable to unauthorized actions or privilege escalation. Most concerning is the complete lack of output escaping across all identified output points, which presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. The vulnerability history further amplifies these concerns, with one unpatched medium severity CVE related to XSS, dating back to 2015. This historical pattern of XSS, combined with the current lack of output escaping and authorization checks, suggests a recurrent weakness in how user-supplied data is handled and validated. While the plugin has minimal direct entry points, the identified weaknesses are critical and could be exploited if any functionality were to be added or discovered.

Key Concerns

  • Unpatched CVEs present
  • No output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
1

Avenir-soft Direct Download Security Vulnerabilities

CVEs by Year

1 CVE in 2015 · unpatched
2015
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2015-9442medium · 6.5Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Avenir-soft Direct Download <= 1.0 - Cross-Site Scripting

Aug 6, 2015Unpatched
Code Analysis
Analyzed Mar 17, 2026

Avenir-soft Direct Download Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Avenir-soft Direct Download Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actioninitindex.php:15
actionadmin_menuindex.php:16
actionwoocommerce_single_product_summaryindex.php:18
actionwoocommerce_after_shop_loop_itemindex.php:19
actioninitindex.php:26
Maintenance & Trust

Avenir-soft Direct Download Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedJan 8, 2015
PHP min version
Downloads3K

Community Trust

Rating74/100
Number of ratings3
Active installs10
Developer Profile

Avenir-soft Direct Download Developer Profile

Sahil-Ahlawat

1 plugin · 10 total installs

69
trust score
Avg Security Score
64/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Avenir-soft Direct Download

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/avenirsoft-directdownload/admin/css/style.css

HTML / DOM Fingerprints

CSS Classes
plugin_wrapperdownloadbutton
JS Globals
window.location
FAQ

Frequently Asked Questions about Avenir-soft Direct Download