Custom Thank you for Woo Security & Risk Analysis

wordpress.org/plugins/custom-thank-you-for-woo

The Custom Thank you and order confirmation page plugin display to customers details after order completing with information.

20 active installs v1.0.7 PHP 7.4+ WP 6.0+ Updated Feb 27, 2025
custom-thank-youorder-confirmation-pagethank-youwoo-commerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Custom Thank you for Woo Safe to Use in 2026?

Generally Safe

Score 92/100

Custom Thank you for Woo has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "custom-thank-you-for-woo" plugin, version 1.0.7, exhibits a mixed security posture. On the positive side, it has no known CVEs and a clean vulnerability history, suggesting a generally well-maintained codebase or limited exposure. The static analysis also shows no apparent attack surface exposed through common vectors like AJAX, REST API, shortcodes, or cron events, with no entry points found to be unprotected. Furthermore, all SQL queries utilize prepared statements, a crucial security best practice.

However, the plugin does present some significant concerns. The presence of two instances of the `unserialize` function is a red flag. If this function is used with user-controlled or untrusted data, it can lead to Remote Code Execution (RCE) vulnerabilities. The taint analysis revealing two flows with unsanitized paths, even without a critical or high severity designation, is concerning in conjunction with the `unserialize` function. Additionally, only 38% of output escaping is properly implemented, meaning a substantial portion of outputs could be vulnerable to Cross-Site Scripting (XSS) attacks. The absence of nonce checks and capability checks across all entry points (though the attack surface is reported as zero) and the use of file operations without further context also warrant caution. The lack of vulnerability history could indicate a lack of rigorous testing or that the plugin is not widely used, making it a potential target for undiscovered vulnerabilities.

In conclusion, while the plugin benefits from a lack of known vulnerabilities and good SQL practices, the identified use of `unserialize` and the significant proportion of improperly escaped output are critical weaknesses. The taint analysis, though not flagged as critical, amplifies the risk associated with `unserialize`. Recommendations should focus on addressing these specific code-level issues to improve the plugin's overall security.

Key Concerns

  • Dangerous function: unserialize used
  • Flows with unsanitized paths found
  • Low output escaping percentage (38%)
  • No nonce checks
  • No capability checks
  • File operations used without context
Vulnerabilities
None known

Custom Thank you for Woo Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Thank you for Woo Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
18
11 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$upload_setting_image= unserialize($upload_setting_image);checkout\thankyou.php:12
unserialize$upload_setting_image= unserialize($upload_setting_image);index.php:304

Output Escaping

38% escaped29 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
thankyou_page_logos (index.php:257)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Custom Thank you for Woo Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actiontemplate_redirectindex.php:64
filterthe_contentindex.php:65
filterwoocommerce_is_order_received_pageindex.php:66
filterwoocommerce_settings_pagesindex.php:69
actionadmin_initindex.php:249
actionadmin_menuindex.php:347
actionwoocommerce_initindex.php:359
Maintenance & Trust

Custom Thank you for Woo Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedFeb 27, 2025
PHP min version7.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Custom Thank you for Woo Developer Profile

SunCart

13 plugins · 510 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Thank you for Woo

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-thank-you-for-woo/checkout/thankyou.php

HTML / DOM Fingerprints

Data Attributes
id="wcty_thankyou_page_id"id="wcty_thankyou_page_enable"id="wcty_thankyou_page_heading"id="wcty_thankyou_page_logo"id="wcty_thankyou_page_heading_color_code"id="wcty_thankyou_page_font_style"+1 more
FAQ

Frequently Asked Questions about Custom Thank you for Woo