Conditional Discounts for WooCommerce Security & Risk Analysis

wordpress.org/plugins/conditional-discounts-for-woocommerce

Boost sales with rule-based WooCommerce discounts. Offer targeted deals based on cart totals, products, and user roles.

10 active installs v1.0.0 PHP 7.0+ WP 5.0+ Updated Mar 21, 2025
conditional-discountscoupondiscountsdynamic-pricingwoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Conditional Discounts for WooCommerce Safe to Use in 2026?

Generally Safe

Score 92/100

Conditional Discounts for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin "conditional-discounts-for-woocommerce" v1.0.0 exhibits a mixed security posture. On the positive side, the code analysis reveals a strong adherence to secure coding practices in several areas. Notably, there are no direct SQL queries that do not use prepared statements, all file operations are absent, and external HTTP requests are not made. The overwhelming majority of output is properly escaped, and the plugin utilizes WordPress's nonce and capability checks for many of its entry points. The absence of any recorded vulnerabilities in its history is also a significant strength, suggesting a developer who is either diligent in their security practices or has not yet encountered exploitable flaws.

However, a critical concern arises from the attack surface analysis. The plugin exposes two AJAX handlers, and alarmingly, both of these lack authentication checks. This means any user, regardless of their logged-in status or role, could potentially trigger these AJAX actions, opening a significant door for attackers. While taint analysis did not reveal any immediate issues, the presence of unprotected AJAX endpoints is a serious risk, as it bypasses crucial authorization and validation mechanisms. The use of a bundled library (Select2) could also be a minor concern if it is outdated, though this is not explicitly stated in the provided data. The overall risk is elevated due to these unprotected entry points, despite the plugin's otherwise good practices.

Key Concerns

  • AJAX handlers without authentication checks
  • AJAX handlers without authentication checks
  • Bundled library (Select2) potentially outdated
Vulnerabilities
None known

Conditional Discounts for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Conditional Discounts for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
72 escaped
Nonce Checks
2
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Select2

Output Escaping

97% escaped74 total outputs
Attack Surface
2 unprotected

Conditional Discounts for WooCommerce Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_cdwc_search_productsincludes\Admin\AdminInterface.php:12
authwp_ajax_cdwc_search_taxonomyincludes\Admin\AdminInterface.php:13
WordPress Hooks 11
actionbefore_woocommerce_initconditional-discounts-for-woocommerce.php:23
actionwoocommerce_loadedconditional-discounts-for-woocommerce.php:29
actionadd_meta_boxesincludes\Admin\AdminInterface.php:10
actioninitincludes\Admin\AdminInterface.php:11
actionsave_post_shop_discountincludes\Admin\AdminInterface.php:14
actionwoocommerce_cart_calculate_feesincludes\DiscountApplier.php:8
actionwoocommerce_order_status_completedincludes\DiscountApplier.php:9
actionwoocommerce_order_status_processingincludes\DiscountApplier.php:10
actionwoocommerce_order_refundedincludes\DiscountApplier.php:12
actionwoocommerce_order_partially_refundedincludes\DiscountApplier.php:13
filterpost_updated_messagesincludes\PluginActions.php:9
Maintenance & Trust

Conditional Discounts for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedMar 21, 2025
PHP min version7.0
Downloads344

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Conditional Discounts for WooCommerce Developer Profile

Amir Candido

2 plugins · 30 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Conditional Discounts for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/conditional-discounts-for-woocommerce/assets/select2.full.min.js/wp-content/plugins/conditional-discounts-for-woocommerce/assets/select2.min.css/wp-content/plugins/conditional-discounts-for-woocommerce/assets/cdwc-admin.css/wp-content/plugins/conditional-discounts-for-woocommerce/assets/cdwc-admin.min.css/wp-content/plugins/conditional-discounts-for-woocommerce/assets/cdwc-admin.js/wp-content/plugins/conditional-discounts-for-woocommerce/assets/cdwc-admin.min.js
Script Paths
/wp-content/plugins/conditional-discounts-for-woocommerce/assets/select2.full.min.js/wp-content/plugins/conditional-discounts-for-woocommerce/assets/cdwc-admin.js/wp-content/plugins/conditional-discounts-for-woocommerce/assets/cdwc-admin.min.js
Version Parameters
conditional-discounts-for-woocommerce/assets/cdwc-admin.css?ver=conditional-discounts-for-woocommerce/assets/cdwc-admin.min.css?ver=

HTML / DOM Fingerprints

CSS Classes
cdwc-rule-fieldcdwc-discount-rules-formcdwc-product-search-wrappercdwc-taxonomy-search-wrappercdwc-discount-type-fieldcdwc-value-type-field
Data Attributes
data-post-iddata-noncedata-ajax-url
JS Globals
cdwc_ajax_object
REST Endpoints
/wp-json/cdwc/v1/search/products/wp-json/cdwc/v1/search/categories/wp-json/cdwc/v1/search/brands
FAQ

Frequently Asked Questions about Conditional Discounts for WooCommerce