CoCart CORS Support Security & Risk Analysis

wordpress.org/plugins/cocart-cors

Enables support for CORS to allow CoCart to work across multiple domains.

400 active installs v1.0.7 PHP 7.4+ WP 5.6+ Updated Jul 26, 2024
corsdecoupledheadlessrest-apiwoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CoCart CORS Support Safe to Use in 2026?

Generally Safe

Score 92/100

CoCart CORS Support has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "cocart-cors" plugin v1.0.7 exhibits an exceptionally clean security profile based on the provided static analysis and vulnerability history. There are no identified entry points like AJAX handlers, REST API routes, or shortcodes, which significantly limits the plugin's attack surface. Furthermore, the code demonstrates excellent security practices, with no dangerous function calls, all SQL queries utilizing prepared statements, and all output being properly escaped. The absence of file operations, external HTTP requests, nonce checks, and capability checks, while contributing to a low attack surface, also means these common security mechanisms are not being utilized within the plugin's code. The vulnerability history is completely clean, with zero recorded CVEs of any severity, which is a strong indicator of well-written and secure code over time. However, the lack of any identified security checks (nonce, capability) in the codebase, combined with the absence of any attack surface, could imply that the plugin is either extremely minimalistic in functionality or relies entirely on WordPress core's default security for its operations. While the current state is highly positive, this lack of explicit security implementations within the plugin itself is a subtle point to consider in a broader security context. Overall, this plugin appears very secure based on the data, with no immediate threats or concerning code patterns.

Vulnerabilities
None known

CoCart CORS Support Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

CoCart CORS Support Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

CoCart CORS Support Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionplugins_loadedcocart-cors.php:44
filtercocart_disable_all_corsincludes\class-cocart-cors.php:43
filtercocart_cookie_samesiteincludes\class-cocart-cors.php:49
actionplugins_loadedload-package.php:34
Maintenance & Trust

CoCart CORS Support Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedJul 26, 2024
PHP min version7.4
Downloads8K

Community Trust

Rating0/100
Number of ratings0
Active installs400
Developer Profile

CoCart CORS Support Developer Profile

CoCart Headless

5 plugins · 2K total installs

77
trust score
Avg Security Score
97/100
Avg Patch Time
143 days
View full developer profile
Detection Fingerprints

How We Detect CoCart CORS Support

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
cocart-cors/includes/class-cocart-cors.php?ver=1.0.7

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about CoCart CORS Support