AWSA Quick Buy for Woocommerce Security & Risk Analysis

wordpress.org/plugins/awsa-quick-buy

با این پلاگین می توانید فروش خود را برای مشتریان شبکه های اجتماعی خود راحت تر کنید و فقط با یک شناسه محصول و استفاده از فرم سفارش سریع

0 active installs v1.0.0 PHP 7.2+ WP 4.2+ Updated Nov 10, 2020
woocommerce-quick-buy%d8%ae%d8%b1%db%8c%d8%af-%d8%a8%d8%a7-%d8%b4%d9%86%d8%a7%d8%b3%d9%87%d8%ae%d8%b1%db%8c%d8%af-%d8%b3%d8%b1%db%8c%d8%b9%d8%ae%d8%b1%db%8c%d8%af-%d8%b3%d8%b1%db%8c%d8%b9-%d9%88%d9%88%da%a9%d8%a7%d9%85%d8%b1%d8%b3%d8%b3%d9%81%d8%a7%d8%b1%d8%b4-%d8%b3%d8%b1%db%8c%d8%b9-%d9%88%d9%88%da%a9%d8%a7%d9%85%d8%b1%d8%b3
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is AWSA Quick Buy for Woocommerce Safe to Use in 2026?

Generally Safe

Score 85/100

AWSA Quick Buy for Woocommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The static analysis of awsa-quick-buy v1.0.0 indicates a generally good security posture with several positive findings. The complete absence of dangerous functions, SQL queries without prepared statements, and file operations suggests a cautious approach to potentially risky coding practices. Furthermore, the high percentage of properly escaped output (91%) and the presence of at least one nonce check are encouraging signs of security awareness. The plugin also has no recorded vulnerability history, which is a significant strength.

However, there are a few areas that warrant attention. The taint analysis revealed two flows with unsanitized paths, which, while not classified as critical or high severity in this analysis, represent a potential risk. If these paths are exploitable, they could lead to unintended behavior or security vulnerabilities. The lack of capability checks across the plugin's entry points is also a concern. While the attack surface is currently reported as zero unprotected entry points, relying solely on nonce checks without proper authorization can leave the plugin vulnerable if new entry points are introduced or if nonce checks are bypassed.

In conclusion, awsa-quick-buy v1.0.0 exhibits strong adherence to fundamental security principles like proper output escaping and prepared SQL statements, and its clean vulnerability history is a major positive. However, the identified unsanitized paths and the absence of capability checks represent potential weaknesses that should be addressed to further harden the plugin's security.

Key Concerns

  • Flows with unsanitized paths found
  • No capability checks on entry points
Vulnerabilities
None known

AWSA Quick Buy for Woocommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

AWSA Quick Buy for Woocommerce Release Timeline

v1.0.0Current
Code Analysis
Analyzed Apr 16, 2026

AWSA Quick Buy for Woocommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
39 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

91% escaped43 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
template_redirect (includes/class-quick-buy-page.php:144)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

AWSA Quick Buy for Woocommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actionadmin_initincludes/class-admin-quick-buy.php:73
actionadmin_post_awsa_quick_buy_settingsincludes/class-admin-quick-buy.php:74
actionadmin_menuincludes/class-admin-quick-buy.php:75
actionadd_meta_boxesincludes/class-admin-quick-buy.php:76
filterquery_argsincludes/class-quick-buy-page.php:22
actioninitincludes/class-quick-buy-page.php:23
actiontemplate_redirectincludes/class-quick-buy-page.php:24
filteradd_to_cart_redirectincludes/class-quick-buy-page.php:26
filterwoocommerce_add_to_cart_redirectincludes/class-quick-buy-page.php:27
filterwoocommerce_continue_shopping_redirectincludes/class-quick-buy-page.php:28
filtertemplate_includeincludes/class-quick-buy-page.php:161
actioninitincludes/class-quick-buy.php:160
Maintenance & Trust

AWSA Quick Buy for Woocommerce Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedNov 10, 2020
PHP min version7.2
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

AWSA Quick Buy for Woocommerce Developer Profile

Sajjad Aslani

2 plugins · 80 total installs

77
trust score
Avg Security Score
75/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AWSA Quick Buy for Woocommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about AWSA Quick Buy for Woocommerce