CoCart – Rate Limiting Security & Risk Analysis

wordpress.org/plugins/cocart-rate-limiting

Enables the rate limiting feature for CoCart.

10 active installs v1.0.4 PHP 7.4+ WP 5.6+ Updated Unknown
decoupledheadlessrate-limitrest-apiwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CoCart – Rate Limiting Safe to Use in 2026?

Generally Safe

Score 100/100

CoCart – Rate Limiting has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "cocart-rate-limiting" v1.0.4 plugin exhibits an exceptionally strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points is a significant positive. Furthermore, the code signals indicate a clean codebase with no dangerous functions, all SQL queries utilizing prepared statements, and all output being properly escaped. The lack of file operations and external HTTP requests further reduces potential attack vectors.

The plugin's vulnerability history is also pristine, with no recorded CVEs. This, combined with the clean code analysis, suggests a development team that prioritizes security. However, it is worth noting that the attack surface is zero, which is unusual and could indicate that the plugin is either very niche, very new, or potentially not fully functional as expected, leading to no exploitable points. While the current analysis shows no weaknesses, ongoing monitoring for future updates and potential vulnerabilities is always recommended for any plugin.

In conclusion, based on the provided data, "cocart-rate-limiting" v1.0.4 appears to be a highly secure plugin with excellent adherence to security best practices. The lack of any identified risks in static analysis and vulnerability history is a strong indicator of its safety. The only point of slight curiosity is the complete absence of any attack surface, which warrants a consideration of its intended functionality and completeness.

Vulnerabilities
None known

CoCart – Rate Limiting Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

CoCart – Rate Limiting Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

CoCart – Rate Limiting Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filtercocart_api_rate_limit_optionsincludes\class-cocart-rate-limiting.php:43
Maintenance & Trust

CoCart – Rate Limiting Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedUnknown
PHP min version7.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

CoCart – Rate Limiting Developer Profile

CoCart Headless

5 plugins · 2K total installs

77
trust score
Avg Security Score
97/100
Avg Patch Time
143 days
View full developer profile
Detection Fingerprints

How We Detect CoCart – Rate Limiting

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cocart-rate-limiting/assets/css/admin.css/wp-content/plugins/cocart-rate-limiting/assets/js/admin.js
Script Paths
/wp-content/plugins/cocart-rate-limiting/assets/js/admin.js
Version Parameters
cocart-rate-limiting/assets/css/admin.css?ver=cocart-rate-limiting/assets/js/admin.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about CoCart – Rate Limiting