Conditional Logic for Woo Product Add-ons Security & Risk Analysis

wordpress.org/plugins/conditional-logic-for-woo-product-add-ons

Show or hide certain fields of the WooCommerce Product Addons based on other fields' values or states (eg, show field X when option Y is selected …

500 active installs v2.2.2 PHP 7.2+ WP 5.0+ Updated Dec 26, 2025
product-add-onswoocommercewoocommerce-product-addonswoocommerce-product-fieldswoocommerce-product-options
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Conditional Logic for Woo Product Add-ons Safe to Use in 2026?

Generally Safe

Score 100/100

Conditional Logic for Woo Product Add-ons has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The plugin "conditional-logic-for-woo-product-add-ons" v2.2.2 exhibits a generally strong security posture based on the provided static analysis. It demonstrates excellent practices regarding SQL queries, output escaping, and the absence of dangerous functions or file operations. The presence of nonce checks is also a positive sign. However, a significant concern arises from the taint analysis, which identified one flow with an unsanitized path and rated it as high severity. This suggests a potential pathway for malicious data to be processed without proper sanitization, which could lead to exploitable vulnerabilities.

The plugin's vulnerability history is clean, with no known CVEs, which is a positive indicator of past security diligence. Coupled with the lack of significant issues in the attack surface analysis (no unprotected entry points), this suggests that the high severity taint flow might be an isolated incident or a potential vulnerability that hasn't been actively exploited or publicly disclosed.

In conclusion, while the plugin follows many best security practices and has a clean historical record, the single high-severity taint flow is a notable weakness that warrants attention and investigation. It's recommended to thoroughly review and sanitize the identified unsanitized path to mitigate this risk.

Key Concerns

  • High severity taint flow with unsanitized path
  • Bundled library Freemius v1.0 outdated
Vulnerabilities
None known

Conditional Logic for Woo Product Add-ons Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Conditional Logic for Woo Product Add-ons Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
112 escaped
Nonce Checks
7
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Freemius1.0

Output Escaping

100% escaped112 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
includeTemplate (src\Core\FileManager.php:140)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Conditional Logic for Woo Product Add-ons Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionadmin_menulicense.php:42
actionbefore_woocommerce_initsrc\AddonsConditionsPlugin.php:30
actionplugins_loadedsrc\AddonsConditionsPlugin.php:55
actionadmin_enqueue_scriptssrc\Admin\Admin.php:19
actionwoocommerce_product_addons_panel_before_optionssrc\Admin\Admin.php:20
filterwoocommerce_product_addons_save_datasrc\Admin\Admin.php:26
actionadmin_noticessrc\Core\AdminNotifier.php:26
filterget_product_addonssrc\Frontend\AddToCartManager.php:16
actionwp_enqueue_scriptssrc\Frontend\Frontend.php:19
actionwc_product_addon_startsrc\Frontend\Frontend.php:27
Maintenance & Trust

Conditional Logic for Woo Product Add-ons Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 26, 2025
PHP min version7.2
Downloads12K

Community Trust

Rating80/100
Number of ratings4
Active installs500
Developer Profile

Conditional Logic for Woo Product Add-ons Developer Profile

meowcrew

5 plugins · 3K total installs

92
trust score
Avg Security Score
97/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Conditional Logic for Woo Product Add-ons

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/conditional-logic-for-woo-product-add-ons/admin/admin.css/wp-content/plugins/conditional-logic-for-woo-product-add-ons/admin/admin.js/wp-content/plugins/conditional-logic-for-woo-product-add-ons/frontend/frontend.js
Script Paths
/wp-content/plugins/conditional-logic-for-woo-product-add-ons/admin/admin.js/wp-content/plugins/conditional-logic-for-woo-product-add-ons/frontend/frontend.js
Version Parameters
conditional-logic-for-woo-product-add-ons/admin/admin.css?ver=conditional-logic-for-woo-product-add-ons/admin/admin.js?ver=conditional-logic-for-woo-product-add-ons/frontend/frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
wc-pao-addon-condition-data
Data Attributes
data-addon-slugdata-addon-typedata-addon-condition-actiondata-addon-condition-match-typedata-addon-product-variationsdata-addon-conditional-rules
JS Globals
cfpaGLOBAL
FAQ

Frequently Asked Questions about Conditional Logic for Woo Product Add-ons