Cart32 Shopping Cart Security & Risk Analysis

wordpress.org/plugins/cart32-shopping-cart

Allows you to easily and quickly connect your Cart32 Shopping Cart to Wordpress.

10 active installs v2.0.11 PHP + WP 3.4+ Updated Dec 2, 2015
cart32e-commerceecommerceinterspireshopping-cart
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Cart32 Shopping Cart Safe to Use in 2026?

Generally Safe

Score 85/100

Cart32 Shopping Cart has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The cart32-shopping-cart plugin exhibits a mixed security posture. On the positive side, it has no known historical vulnerabilities (CVEs) and its code does not appear to use dangerous functions or perform raw SQL queries without prepared statements. Furthermore, it has a very small attack surface with no unprotected entry points identified in the static analysis. This suggests a generally good level of security awareness in development regarding common web vulnerabilities like SQL injection and direct file manipulation.

However, significant concerns arise from the lack of output escaping and the taint analysis. The fact that 100% of outputs are not properly escaped is a major red flag, potentially exposing the application and its users to cross-site scripting (XSS) vulnerabilities. The presence of two taint flows with unsanitized paths, while not classified as critical or high severity, indicates potential avenues for malicious data to enter the application and be processed without adequate validation. The absence of nonce checks and capability checks on any entry points is also concerning, as it implies a lack of defense against common cross-site request forgery (CSRF) and unauthorized action vulnerabilities.

In conclusion, while the plugin benefits from a clean vulnerability history and a limited attack surface, the prevalent lack of output escaping and the identified unsanitized taint flows are substantial weaknesses. These issues, coupled with the missing nonce and capability checks, significantly increase the risk of client-side attacks and unauthorized operations. Developers should prioritize addressing the output escaping and taint flow vulnerabilities to improve the plugin's overall security.

Key Concerns

  • All outputs unescaped
  • Taint flows with unsanitized paths (2)
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Cart32 Shopping Cart Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Cart32 Shopping Cart Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
26
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

0% escaped26 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
cart32wordpress_settings (cart32.php:61)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Cart32 Shopping Cart Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[cart32] cart32.php:631
WordPress Hooks 12
actioninitcart32.php:14
filterquery_varscart32.php:16
actionparse_requestcart32.php:21
actionadmin_menucart32.php:630
actionmedia_buttons_contextcart32.php:632
actionadmin_footercart32.php:633
actionget_footercart32.php:634
actionin_admin_footercart32.php:635
actionafter_switch_themecart32.php:636
actioncustomize_savecart32.php:637
filterplugin_action_linkscart32.php:639
filterwp_nav_menu_itemscart32.php:640
Maintenance & Trust

Cart32 Shopping Cart Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedDec 2, 2015
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Cart32 Shopping Cart Developer Profile

beaubC32

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cart32 Shopping Cart

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cart32-shopping-cart/cart32_for_wordpress.png

HTML / DOM Fingerprints

CSS Classes
postboxinside
Data Attributes
name="cart32wp_client_code"name="cart32wp_cart32_url"name="cart32wp_c32web_url"name="cart32wp_access_code"name="cart32wp_account_info"name="cart32_wp_add_view_cart_to_menu"+3 more
FAQ

Frequently Asked Questions about Cart32 Shopping Cart