Coupon Card Security & Risk Analysis

wordpress.org/plugins/coupon-card

Promote Various Coupon And Discount Offers.

10 active installs v1.0.0 PHP + WP 4.0.0+ Updated Unknown
coupondiscountsofferspromo-code
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Coupon Card Safe to Use in 2026?

Generally Safe

Score 100/100

Coupon Card has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "coupon-card" v1.0.0 plugin exhibits a generally good security posture with several positive indicators. It has a small attack surface, with all identified entry points (AJAX handlers) protected by nonce and capability checks. The plugin also demonstrates strong output sanitization practices, with over 90% of outputs properly escaped, and it avoids risky operations like file manipulations or external HTTP requests. The absence of known vulnerabilities and a clean vulnerability history further bolster its security profile.

However, there are a few areas for improvement. The presence of three SQL queries without prepared statements is a notable concern, as this can lead to SQL injection vulnerabilities if user-supplied data is not meticulously sanitized before being incorporated into these queries. While taint analysis did not reveal any immediate critical or high-severity issues, the lack of prepared statements increases the potential for such issues to arise in the future if the plugin evolves. The plugin's overall security is good, but addressing the raw SQL queries is crucial for a more robust defense.

In conclusion, "coupon-card" v1.0.0 is a relatively secure plugin, particularly due to its protected entry points and good output escaping. The primary weakness lies in its SQL query practices. The lack of any past vulnerabilities is a positive sign, suggesting a conscious effort towards security by the developers. The plugin is in a decent state, but the identified SQL practice warrants attention to achieve a truly robust security posture.

Key Concerns

  • SQL queries without prepared statements
Vulnerabilities
None known

Coupon Card Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Coupon Card Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
2
34 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries

Output Escaping

94% escaped36 total outputs
Attack Surface

Coupon Card Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_cardinc\functions.php:184
authwp_ajax_delete_cardinc\functions.php:246
WordPress Hooks 5
actionwp_enqueue_scriptsinc\functions.php:19
actionadmin_enqueue_scriptsinc\functions.php:45
actiontemplate_redirectinc\functions.php:60
actionwp_footerinc\functions.php:97
actionadmin_menuinc\menu.php:17
Maintenance & Trust

Coupon Card Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedUnknown
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Coupon Card Developer Profile

Ayan

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Coupon Card

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
../css/animate.css../css/style.css../js/script.js
Script Paths
../js/script.js
Version Parameters
coupon-card/css/animate.css?ver=coupon-card/css/style.css?ver=coupon-card/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
coupon-cardcc-closocoupon-infocoupon-titlecoupon-linkcc-coupon
Data Attributes
id="cc-show-coupon"
JS Globals
window.CC
REST Endpoints
/wp-json/coupon-card
Shortcode Output
<div class="coupon-card animated bounceInRight"
FAQ

Frequently Asked Questions about Coupon Card