Customize Discount Security & Risk Analysis

wordpress.org/plugins/customize-discount

This Plugin will allow the user to give the discount to users. Through this plugins customer can give their clients an auto

0 active installs v1.0.0 PHP + WP 5.1+ Updated Aug 20, 2021
custom-discountcustomise-discountdiscountwoocommerce-custom-discountwoocommerce-discount
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Customize Discount Safe to Use in 2026?

Generally Safe

Score 85/100

Customize Discount has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "customize-discount" plugin v1.0.0 exhibits several significant security concerns despite a lack of publicly known vulnerabilities. The primary area of weakness lies in its attack surface, with all three identified AJAX handlers lacking authentication checks. This means that any authenticated user, regardless of their role or permissions, could potentially trigger these AJAX actions, opening the door for unauthorized modifications or unintended actions within the plugin. While the plugin demonstrates good practices by exclusively using prepared statements for SQL queries and having a high percentage of properly escaped output, the absence of proper authorization on entry points is a critical oversight that undermines these positive aspects. The lack of any recorded vulnerability history is a positive indicator, suggesting that the developers have either been diligent or lucky, but it doesn't negate the immediate risks present in the current code. The plugin's overall security posture is therefore fragile, heavily reliant on the assumption that unauthenticated access to these AJAX endpoints will not be exploited, which is an unreliable security strategy.

Key Concerns

  • AJAX handlers without authentication checks
  • All AJAX handlers lack authentication checks
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Customize Discount Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Customize Discount Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

82% escaped11 total outputs
Attack Surface
3 unprotected

Customize Discount Attack Surface

Entry Points3
Unprotected3

AJAX Handlers 3

authwp_ajax_sayhelloadmin\class-zwk-customize-discount-admin.php:59
authwp_ajax_zwk_apply_couponpublic\class-zwk-customize-discount-public.php:61
noprivwp_ajax_zwk_apply_couponpublic\class-zwk-customize-discount-public.php:62
WordPress Hooks 12
actionadmin-initadmin\class-zwk-customize-discount-admin.php:55
filterwoocommerce_get_settings_pagesadmin\class-zwk-customize-discount-admin.php:56
actionviews_edit-shop_couponadmin\class-zwk-customize-discount-admin.php:57
actionplugins_loadedincludes\class-zwk-customize-discount.php:142
actionadmin_enqueue_scriptsincludes\class-zwk-customize-discount.php:157
actionadmin_enqueue_scriptsincludes\class-zwk-customize-discount.php:158
actionwp_enqueue_scriptsincludes\class-zwk-customize-discount.php:173
actionwp_enqueue_scriptsincludes\class-zwk-customize-discount.php:174
actionwoocommerce_before_thankyoupublic\class-zwk-customize-discount-public.php:59
actionwoocommerce_cart_couponpublic\class-zwk-customize-discount-public.php:60
actionwp_headpublic\class-zwk-customize-discount-public.php:63
actionadmin_noticeszwk-customize-discount.php:53
Maintenance & Trust

Customize Discount Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedAug 20, 2021
PHP min version
Downloads794

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Customize Discount Developer Profile

Zworthkey

5 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Customize Discount

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/customize-discount/css/zwk-customize-discount-admin.css/wp-content/plugins/customize-discount/js/zwk-customize-discount-admin.js/wp-content/plugins/customize-discount/js/zwk-customize-discount.js
Script Paths
js/zwk-customize-discount.js
Version Parameters
customize-discount/css/zwk-customize-discount-admin.css?ver=customize-discount/js/zwk-customize-discount-admin.js?ver=customize-discount/js/zwk-customize-discount.js?ver=

HTML / DOM Fingerprints

CSS Classes
zwkcd-notice-error
HTML Comments
<!-- This file is read by WordPress to generate the plugin information in the plugin * admin area. This file also includes all of the dependencies used by the plugin, * registers the activation and deactivation functions, and defines a function * that starts the plugin. --><!-- Currently plugin version. --><!-- The code that runs during plugin activation. --><!-- Check if woocommerce is installed -->+19 more
Data Attributes
id="sync_coupon"
JS Globals
window.zwk_customize_discount_obj
REST Endpoints
/wp-json/zwk-customize-discount/v1
FAQ

Frequently Asked Questions about Customize Discount