Automatic Lead Generator for WooCommerce Security & Risk Analysis

wordpress.org/plugins/coupon-pop-for-wp

Automatic Lead Generator plugin increasing your visitors' engagement and conversion rate from day one!

50 active installs v1.1 PHP + WP 3.0+ Updated Oct 29, 2024
collectecommerceemailspopupwoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Automatic Lead Generator for WooCommerce Safe to Use in 2026?

Generally Safe

Score 92/100

Automatic Lead Generator for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "coupon-pop-for-wp" plugin v1.1 exhibits a mixed security posture. On the positive side, the static analysis reveals no identified critical or high-severity taint flows, no dangerous functions, and all SQL queries utilize prepared statements. The absence of known vulnerabilities in its history is also a strong indicator of a generally secure development practice. However, a significant concern arises from the complete lack of output escaping for all 16 identified output points. This means that any data displayed to users, even if it originates from a trusted source, could potentially be rendered in an unescaped manner, opening the door to cross-site scripting (XSS) vulnerabilities if user-controlled data is ever introduced into these outputs. Additionally, while there is one capability check, the complete absence of nonce checks for AJAX handlers (of which there are none in this version, but this could change in future updates) and the presence of an external HTTP request without further analysis of its sanitization are also minor points of concern. The plugin appears to have a very limited attack surface in its current version, but the unescaped output is a significant weakness that needs immediate attention. The lack of historical vulnerabilities is positive, but the current code analysis reveals a critical oversight in output handling.

Key Concerns

  • 100% of outputs are not properly escaped
  • External HTTP request without clear sanitization
  • No nonce checks on potential AJAX entry points
Vulnerabilities
None known

Automatic Lead Generator for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Automatic Lead Generator for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped16 total outputs
Attack Surface

Automatic Lead Generator for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionwp_footerstoreya-coupon-pop.php:20
actioninitstoreya-coupon-pop.php:42
actionadmin_noticesstoreya-coupon-pop.php:44
filterplugin_action_linksstoreya-coupon-pop.php:45
actionadmin_menustoreya-coupon-pop.php:52
actionadmin_initstoreya-coupon-pop.php:145
actiontemplate_redirectSyncManager.php:9
filterposts_whereSyncManager.php:158
Maintenance & Trust

Automatic Lead Generator for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedOct 29, 2024
PHP min version
Downloads24K

Community Trust

Rating82/100
Number of ratings14
Active installs50
Developer Profile

Automatic Lead Generator for WooCommerce Developer Profile

storeya

5 plugins · 1K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Automatic Lead Generator for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
//www.storeya.com/externalscript/couponpop/

HTML / DOM Fingerprints

Data Attributes
data-secret-key
JS Globals
scpID
FAQ

Frequently Asked Questions about Automatic Lead Generator for WooCommerce