Avify Security & Risk Analysis

wordpress.org/plugins/avify

Connect your WooCommerce account to Avify and send all your orders to one centralized inventory.

80 active installs v1.3.8 PHP 7.0+ WP 5.6+ Updated Feb 12, 2026
avifycheckoutorderspayment-gatewaywoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Avify Safe to Use in 2026?

Generally Safe

Score 100/100

Avify has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "avify" v1.3.8 plugin presents a mixed security profile. On the positive side, it has no known historical vulnerabilities (CVEs) and its static analysis reveals no direct use of dangerous functions or external HTTP requests. Furthermore, all detected SQL queries are properly prepared, mitigating common injection risks. The plugin also utilizes prepared statements for SQL, which is a strong security practice. However, several concerning aspects emerge from the code analysis. A significant weakness is the complete absence of nonce checks and capability checks, which are fundamental security mechanisms for preventing CSRF attacks and unauthorized actions. The taint analysis highlights two high-severity flows with unsanitized paths, indicating potential for information disclosure or other vulnerabilities if these paths are exploited, even though they are not currently classified as critical.

The lack of nonce and capability checks is a critical oversight, leaving the plugin vulnerable to cross-site request forgery (CSRF) and unauthorized access if any of its entry points can be triggered by unauthenticated or lower-privileged users. The high-severity taint flows, while not resulting in critical vulnerabilities in this analysis, suggest that the plugin is handling potentially sensitive data or paths without adequate sanitization, which could be a precursor to future issues or be exploitable in conjunction with other weaknesses. The moderate output escaping (52%) also presents a moderate risk of cross-site scripting (XSS) vulnerabilities. While the vulnerability history is clean, the presence of these code-level weaknesses suggests that the plugin may not be as robust as its history implies, and future vulnerabilities could arise if these issues are not addressed.

Key Concerns

  • High severity taint flow with unsanitized paths
  • High severity taint flow with unsanitized paths
  • Moderate output escaping (52% proper)
  • Zero nonce checks
  • Zero capability checks
Vulnerabilities
None known

Avify Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Avify Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
38
41 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

52% escaped79 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
perform_basic_authentication (avify-rest.php:129)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Avify Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[avify_checkout] includes\checkout.php:7
WordPress Hooks 26
actionwp_enqueue_scriptsavify-checkout.php:20
actionwoocommerce_before_add_to_cart_buttonavify-custom-options.php:22
filterwoocommerce_add_cart_item_dataavify-custom-options.php:95
filterwoocommerce_get_item_dataavify-custom-options.php:188
actionwoocommerce_before_calculate_totalsavify-custom-options.php:244
actionwoocommerce_checkout_create_order_line_itemavify-custom-options.php:283
filterwoocommerce_hidden_order_itemmetaavify-custom-options.php:293
actionwoocommerce_before_order_itemmetaavify-custom-options.php:300
actionwoocommerce_order_item_meta_startavify-custom-options.php:301
filterwoocommerce_email_recipient_new_orderavify-orders.php:18
filterwoocommerce_email_recipient_customer_on_hold_orderavify-orders.php:19
filterwoocommerce_email_recipient_customer_processing_orderavify-orders.php:20
filterwoocommerce_email_recipient_customer_pending_orderavify-orders.php:21
filterwoocommerce_email_enabled_new_orderavify-orders.php:39
filterwoocommerce_can_reduce_order_stockavify-orders.php:54
actionrest_api_initavify-rest.php:15
actionwoocommerce_shipping_initavify-shipping.php:213
filterwoocommerce_shipping_methodsavify-shipping.php:220
actionwoocommerce_checkout_update_order_metaavify-shipping.php:243
actionadmin_noticesavify-wordpress-initializer.php:80
filterwoocommerce_payment_gatewaysavify-wordpress-initializer.php:90
actionplugins_loadedavify-wordpress-initializer.php:108
actionplugins_loadedavify-wordpress-initializer.php:125
filterwoocommerce_checkout_update_order_reviewavify-wordpress-initializer.php:135
actionadmin_menuavify-wordpress-initializer.php:158
actionadmin_initavify-wordpress-initializer.php:264
Maintenance & Trust

Avify Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedFeb 12, 2026
PHP min version7.0
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs80
Developer Profile

Avify Developer Profile

Alexis Valenciano

1 plugin · 80 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Avify

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/avify/avify-checkout.css/wp-content/plugins/avify/avify-checkout.js/wp-content/plugins/avify/avify-custom-options.css/wp-content/plugins/avify/avify-custom-options.js/wp-content/plugins/avify/avify-payments-gateway.css/wp-content/plugins/avify/avify-payments-gateway.js/wp-content/plugins/avify/avify-shipping.css/wp-content/plugins/avify/avify-shipping.js+1 more
Script Paths
/wp-content/plugins/avify/avify-checkout.js/wp-content/plugins/avify/avify-custom-options.js/wp-content/plugins/avify/avify-payments-gateway.js/wp-content/plugins/avify/avify-shipping.js
Version Parameters
avify/avify-checkout.css?ver=avify/avify-checkout.js?ver=avify/avify-custom-options.css?ver=avify/avify-custom-options.js?ver=avify/avify-payments-gateway.css?ver=avify/avify-payments-gateway.js?ver=avify/avify-shipping.css?ver=avify/avify-shipping.js?ver=avify/avify-styles.css?ver=

HTML / DOM Fingerprints

CSS Classes
avify-checkout-formavify-custom-options-field
HTML Comments
<!-- Avify Gateway --><!-- Avify Orders --><!-- Avify Shipping --><!-- Avify Rest -->+3 more
Data Attributes
data-avify-option
JS Globals
avify_checkout_params
REST Endpoints
/wp-json/avify/v1/orders/wp-json/avify/v1/shipping-methods/wp-json/avify/v1/payment-status
Shortcode Output
[avify_checkout]
FAQ

Frequently Asked Questions about Avify