Cart66 to Mailchimp Security & Risk Analysis

wordpress.org/plugins/cart66-to-mailchimp

Send customer emails to a Mailchimp list at the completion of a Cart66 transaction. Customer will receive a confirmation email from Mailchimp.

10 active installs v1.4 PHP + WP 2.8.2+ Updated Aug 10, 2013
cart66emailintegrationmailchimpnewsletter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Cart66 to Mailchimp Safe to Use in 2026?

Generally Safe

Score 85/100

Cart66 to Mailchimp has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The cart66-to-mailchimp plugin v1.4 exhibits a generally strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points is a significant positive. Furthermore, the code demonstrates good practices with 100% of SQL queries using prepared statements and all detected outputs being properly escaped. The lack of any known vulnerabilities in its history also suggests a history of secure development. However, a critical concern arises from the presence of the `unserialize` function, which, without proper sanitization or input validation, can lead to severe security vulnerabilities such as Remote Code Execution (RCE) if untrusted data is processed. The absence of nonce checks and capability checks on any potential entry points (though none were identified in the static analysis) is also a weakness. While the current static analysis shows no direct exploitable paths, the `unserialize` function represents a latent risk that requires careful attention and input validation to mitigate.

Key Concerns

  • Use of unserialize() without validation
  • Lack of nonce checks
  • Lack of capability checks
Vulnerabilities
None known

Cart66 to Mailchimp Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Cart66 to Mailchimp Release Timeline

v1.3
v1.2
v1.1
Code Analysis
Analyzed Mar 17, 2026

Cart66 to Mailchimp Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
0
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$serial = unserialize($response);mcinc\MCAPI.class.php:2464

Output Escaping

100% escaped4 total outputs
Attack Surface

Cart66 to Mailchimp Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioncart66_after_order_savedcart66_to_mailchimp.php:56
actionadmin_initcart66_to_mailchimp.php:64
actionadmin_menucart66_to_mailchimp.php:93
Maintenance & Trust

Cart66 to Mailchimp Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedAug 10, 2013
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Cart66 to Mailchimp Developer Profile

johndaskovsky

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cart66 to Mailchimp

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
id="cart66-to-mailchimp-options-form"
FAQ

Frequently Asked Questions about Cart66 to Mailchimp