
BW Coupon Security & Risk Analysis
wordpress.org/plugins/bw-couponWooCommerce Seller can create PDF coupons for sale. Customer will get an attached PDF coupon after purchase the coupon.
Is BW Coupon Safe to Use in 2026?
Generally Safe
Score 92/100BW Coupon has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "bw-coupon" plugin v1.5.3 exhibits several security concerns despite having no known historical vulnerabilities. The static analysis reveals a significant attack surface, with all 4 REST API routes lacking permission callbacks. This means any authenticated user, potentially even those with minimal privileges, could interact with these endpoints, opening the door for unauthorized actions or data manipulation. Furthermore, the plugin has a moderate concern regarding output escaping, with only 50% of outputs being properly escaped. This increases the risk of cross-site scripting (XSS) vulnerabilities if user-supplied data is directly rendered in the output without sanitization.
The taint analysis shows 2 flows with unsanitized paths, which is a direct indicator of potential vulnerabilities. While these are not classified as critical or high severity, unsanitized paths can still lead to various security issues if they involve user-controlled input that is not properly validated or neutralized. The presence of file operations, while not inherently risky, warrants attention when combined with other vulnerabilities like unsanitized paths, as it could potentially lead to local file inclusion or other file manipulation attacks. The plugin does have some good practices, including some use of prepared statements for SQL queries and the inclusion of a nonce check, but these are overshadowed by the unprotected REST API endpoints and the taint flow issues.
Overall, the plugin's security posture is concerning due to the lack of authorization checks on its REST API and the presence of unsanitized paths in its code. While the absence of known CVEs and a history of vulnerabilities is a positive sign, it does not guarantee the plugin's current security. The identified weaknesses, particularly the unprotected entry points and taint flows, present a tangible risk to WordPress installations. It is recommended to address the permission callbacks on REST API routes and thoroughly review and sanitize the identified unsanitized paths.
Key Concerns
- REST API routes without permission callbacks
- Unescaped output (50% proper)
- Taint flows with unsanitized paths (2 flows)
- Bundled library 'dompdf'
BW Coupon Security Vulnerabilities
BW Coupon Release Timeline
BW Coupon Code Analysis
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
BW Coupon Attack Surface
REST API Routes 4
WordPress Hooks 28
Maintenance & Trust
BW Coupon Maintenance & Trust
Maintenance Signals
Community Trust
BW Coupon Alternatives
WC Recurring Invoice
wc-invoice-pdf
WooCommerce invoice PDF generator for recurring / non-recurring orders and Email submission.
Simple PDF Coupon for WooCommerce
simple-pdf-coupon-for-woocommerce
WooCommerce Simple PDF Coupon module to create PDF coupons
Apply Coupons on Product Pages – For WooCommerce
coupons-on-products-woo
Allows customers to apply coupons on product pages and see the discounted price immediately.
Required Products Coupons for WooCommerce
runthings-wc-coupons-required-products
Restrict the usage of WooCommerce coupons unless required products are in the cart.
PDF Invoices & Packing Slips for WooCommerce
woocommerce-pdf-invoices-packing-slips
Create, print & automatically email PDF or XML Invoices & PDF Packing Slips for WooCommerce orders.
BW Coupon Developer Profile
4 plugins · 10 total installs
How We Detect BW Coupon
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/bw-coupon/admin/js/bwc.js/wp-content/plugins/bw-coupon/admin/css/styles.cssHTML / DOM Fingerprints
bwc_preview_pdfbwc_email_pdfdata-coupondata-domain