DC BOGO Coupons Security & Risk Analysis

wordpress.org/plugins/dc-bogo-coupons

The minimal, elegant, and powerful solution for creating advanced Buy One, Get One offers in WooCommerce.

0 active installs v1.1.3 PHP 7.4+ WP 5.0+ Updated Dec 5, 2025
bogobuy-one-get-onecouponsdiscountswoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is DC BOGO Coupons Safe to Use in 2026?

Generally Safe

Score 100/100

DC BOGO Coupons has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The dc-bogo-coupons plugin v1.1.3 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by utilizing prepared statements for all SQL queries and making no external HTTP requests. It also incorporates a reasonable number of nonce and capability checks relative to its attack surface. The absence of recorded vulnerabilities and CVEs in its history is a strong indicator of diligent security practices or a lack of targeting.

However, significant concerns arise from the static analysis. The presence of two unprotected AJAX handlers presents a clear risk. These handlers are direct entry points into the plugin that lack authentication, potentially allowing unauthenticated users to trigger unintended actions or access sensitive data. While no critical taint flows or dangerous functions were identified, the unprotected AJAX handlers significantly broaden the attack surface and provide opportunities for privilege escalation or denial-of-service attacks if not properly secured within the handler logic itself. The 64% output escaping rate, while not critically low, also suggests a potential for cross-site scripting (XSS) vulnerabilities in the remaining 36% of outputs.

In conclusion, while the plugin has a clean vulnerability history and avoids common pitfalls like raw SQL and external requests, the two unprotected AJAX handlers are a critical weakness that needs immediate attention. The potential for XSS through improper output escaping should also be investigated. Addressing these specific issues will significantly improve the plugin's security.

Key Concerns

  • Unprotected AJAX handlers
  • Incomplete output escaping
Vulnerabilities
None known

DC BOGO Coupons Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

DC BOGO Coupons Release Timeline

v1.1.3Current
Code Analysis
Analyzed Mar 17, 2026

DC BOGO Coupons Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
57
103 escaped
Nonce Checks
5
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

64% escaped160 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

3 flows
render_settings_page (includes\class-dc-bogo-admin.php:222)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

DC BOGO Coupons Attack Surface

Entry Points4
Unprotected2

AJAX Handlers 4

authwp_ajax_dc_bogo_toggle_rule_statusincludes\class-dc-bogo-ajax.php:21
authwp_ajax_dc_bogo_get_progressincludes\class-dc-bogo-ajax.php:22
noprivwp_ajax_dc_bogo_get_progressincludes\class-dc-bogo-ajax.php:23
authwp_ajax_dc_bogo_toggle_progressincludes\class-dc-bogo-ajax.php:24
WordPress Hooks 26
actionbefore_woocommerce_initdc-bogo-coupons.php:22
actionadmin_noticesdc-bogo-coupons.php:32
actionadmin_noticesdc-bogo-coupons.php:62
actionadmin_menuincludes\class-dc-bogo-admin.php:21
actionadd_meta_boxesincludes\class-dc-bogo-admin.php:22
actionadd_meta_boxesincludes\class-dc-bogo-admin.php:23
actionadmin_headincludes\class-dc-bogo-admin.php:24
actionadmin_enqueue_scriptsincludes\class-dc-bogo-admin.php:25
actionsave_post_dc_bogo_ruleincludes\class-dc-bogo-admin.php:26
filterpost_updated_messagesincludes\class-dc-bogo-admin.php:27
filtermanage_dc_bogo_rule_posts_columnsincludes\class-dc-bogo-admin.php:28
actionmanage_dc_bogo_rule_posts_custom_columnincludes\class-dc-bogo-admin.php:29
actionsave_post_dc_bogo_ruleincludes\class-dc-bogo-admin.php:761
actionwoocommerce_before_calculate_totalsincludes\class-dc-bogo-cart.php:57
actionwoocommerce_checkout_create_orderincludes\class-dc-bogo-cart.php:58
actionwoocommerce_checkout_order_processedincludes\class-dc-bogo-cart.php:59
actionbefore_delete_postincludes\class-dc-bogo-cart.php:60
filterwoocommerce_cart_coupon_htmlincludes\class-dc-bogo-cart.php:61
actionwoocommerce_cart_item_removedincludes\class-dc-bogo-cart.php:63
actionwoocommerce_cart_item_restoredincludes\class-dc-bogo-cart.php:64
filterwoocommerce_get_cart_item_from_sessionincludes\class-dc-bogo-cart.php:67
actioninitincludes\class-dc-bogo-cpt.php:21
actionwp_enqueue_scriptsincludes\class-dc-bogo-frontend.php:21
actionwoocommerce_before_cart_totalsincludes\class-dc-bogo-frontend.php:22
actionwoocommerce_before_cartincludes\class-dc-bogo-frontend.php:23
actionwoocommerce_before_cart_totalsincludes\class-dc-bogo-frontend.php:24
Maintenance & Trust

DC BOGO Coupons Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 5, 2025
PHP min version7.4
Downloads181

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

DC BOGO Coupons Developer Profile

Dipak Chaudhari

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect DC BOGO Coupons

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dc-bogo-coupons/includes/images/icon-20x20.png
Script Paths
/wp-content/plugins/dc-bogo-coupons/admin.js
Version Parameters
dc-bogo-coupons/admin.js?ver=1.0.12

HTML / DOM Fingerprints

CSS Classes
dc-bogo-coupons
HTML Comments
<!-- DC BOGO Coupons -->
Data Attributes
data-rule-iddata-rule-status
JS Globals
dcBogoAdmin
FAQ

Frequently Asked Questions about DC BOGO Coupons