Cartloom Plugin Security & Risk Analysis

wordpress.org/plugins/cartloom

Easily add Buy Buttons, Product Groups, Shopping Cart and a Secure Checkout to Wordpress Pages and Posts.

10 active installs v1.0.1 PHP 5.6+ WP 4.6+ Updated Feb 20, 2018
cartcartloomdisplay-productse-commerceinventory
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Cartloom Plugin Safe to Use in 2026?

Generally Safe

Score 85/100

Cartloom Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The Cartloom v1.0.1 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries and has no recorded vulnerabilities or CVEs. The static analysis also shows a complete absence of dangerous functions, file operations, and external HTTP requests, which significantly reduces common attack vectors. Furthermore, there are no apparent taint analysis issues, suggesting that data handling within the plugin is generally safe.

However, several areas raise concern. The plugin lacks nonce checks and capability checks for its entry points, including its shortcodes and any potential (though not explicitly listed) AJAX or REST API endpoints that might exist. This means that authenticated users could potentially trigger unintended actions or access information without proper authorization. Additionally, a significant portion (56%) of its output escaping is missing. This could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is displayed without proper sanitization, potentially allowing attackers to inject malicious scripts into pages viewed by other users.

In conclusion, while Cartloom v1.0.1 benefits from the absence of known vulnerabilities and secure database interactions, the lack of robust authorization checks (nonces and capabilities) and insufficient output escaping represent notable security weaknesses. These shortcomings create potential avenues for XSS and unauthorized action exploits, which warrant attention and remediation.

Key Concerns

  • Missing nonce checks on entry points
  • Missing capability checks on entry points
  • Insufficient output escaping (56%)
Vulnerabilities
None known

Cartloom Plugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Cartloom Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
20
16 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

44% escaped36 total outputs
Attack Surface

Cartloom Plugin Attack Surface

Entry Points5
Unprotected0

Shortcodes 5

[cl_button] public\class-cartloom-public.php:113
[cl_product] public\class-cartloom-public.php:115
[cl_group] public\class-cartloom-public.php:117
[cl_lookup] public\class-cartloom-public.php:119
[cl_viewcart] public\class-cartloom-public.php:121
WordPress Hooks 12
actioncmb2_save_options-page_fields_cartloom_plugin_metaboxadmin\class-cartloom-admin.php:242
actionplugins_loadedincludes\class-cartloom.php:178
actionadmin_enqueue_scriptsincludes\class-cartloom.php:194
actionadmin_enqueue_scriptsincludes\class-cartloom.php:196
actionadmin_initincludes\class-cartloom.php:198
actionadmin_menuincludes\class-cartloom.php:200
actionmedia_buttonsincludes\class-cartloom.php:202
actionwp_enqueue_scriptsincludes\class-cartloom.php:220
actionwp_enqueue_scriptsincludes\class-cartloom.php:222
actioninitincludes\class-cartloom.php:224
filterwp_nav_menu_objectsincludes\class-cartloom.php:226
actionwidgets_initpublic\class-cartloom-public.php:60
Maintenance & Trust

Cartloom Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedFeb 20, 2018
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Cartloom Plugin Developer Profile

yabdab

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cartloom Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cartloom/admin/css/cartloom-admin.css/wp-content/plugins/cartloom/admin/js/cartloom-admin.js
Version Parameters
cartloom-admin.css?ver=cartloom-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
cl_embed_btn_wrapcartloom-add-shortcodecl_embed_btncartloom-popupcl-iconcl-icon-logo-ocl_embeds_outcartloom-popup-html+14 more
HTML Comments
<!-- The code that runs during plugin activation. --><!-- If this file is called directly, abort. --><!-- The code that runs during plugin deactivation. --><!-- The core plugin class that is used to define internationalization, -->+15 more
Data Attributes
data-cartnamedata-iddata-type
REST Endpoints
/api/products/wp/format/json/X-API-KEY/
Shortcode Output
[cartloom_buy_button[cartloom_product_group[cartloom_cart
FAQ

Frequently Asked Questions about Cartloom Plugin