Dealicious Conditional Checkout Rules for WooCommerce Security & Risk Analysis

wordpress.org/plugins/dealicious-conditional-checkout-rules

Dynamically show or hide WooCommerce checkout fields based on product type, billing country, and cart value.

0 active installs v1.0.0 PHP 7.4+ WP 6.0+ Updated Mar 17, 2026
checkoutcheckout-fieldsconditional-logicecommercewoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Dealicious Conditional Checkout Rules for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

Dealicious Conditional Checkout Rules for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The plugin 'dealicious-conditional-checkout-rules' v1.0.0 exhibits a strong security posture based on the provided static analysis. There are no apparent direct entry points such as AJAX handlers, REST API routes, or shortcodes that lack authorization checks, indicating a minimal attack surface. The code demonstrates good security practices by utilizing prepared statements for all SQL queries and properly escaping all output, which mitigates common injection vulnerabilities and cross-site scripting (XSS) risks. The presence of nonce and capability checks further bolsters its defenses against unauthorized actions. The absence of any known vulnerabilities (CVEs) in its history suggests a well-maintained and secure development process.

However, the taint analysis did reveal two flows with unsanitized paths. While these are not classified as critical or high severity, they warrant attention as they could potentially lead to unexpected behavior or vulnerabilities if exploited in specific contexts. The lack of file operations and external HTTP requests further reduces the potential for certain types of attacks. Overall, this plugin appears to be built with security in mind, but the identified unsanitized paths represent a minor area for improvement to achieve a fully robust security profile.

Key Concerns

  • Taint flows with unsanitized paths
Vulnerabilities
None known

Dealicious Conditional Checkout Rules for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Dealicious Conditional Checkout Rules for WooCommerce Release Timeline

v1.0.0Current
Code Analysis
Analyzed Apr 16, 2026

Dealicious Conditional Checkout Rules for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
73 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped73 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
save_rules (includes/class-dealcoch-admin.php:43)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Dealicious Conditional Checkout Rules for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_menuincludes/class-dealcoch-admin.php:13
actionadmin_enqueue_scriptsincludes/class-dealcoch-admin.php:14
actionadmin_post_dealcoch_save_rulesincludes/class-dealcoch-admin.php:15
actionplugins_loadedincludes/class-dealcoch-plugin.php:24
actionadmin_noticesincludes/class-dealcoch-plugin.php:29
actionwp_enqueue_scriptsincludes/class-dealcoch-plugin.php:35
filterwoocommerce_checkout_fieldsincludes/class-dealcoch-plugin.php:36
actionwoocommerce_after_checkout_validationincludes/class-dealcoch-plugin.php:37
Maintenance & Trust

Dealicious Conditional Checkout Rules for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 17, 2026
PHP min version7.4
Downloads163

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Dealicious Conditional Checkout Rules for WooCommerce Developer Profile

Rashed Hossain

5 plugins · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Dealicious Conditional Checkout Rules for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dealicious-conditional-checkout-rules/assets/js/admin.js
Script Paths
/wp-content/plugins/dealicious-conditional-checkout-rules/assets/js/admin.js
Version Parameters
dealicious-conditional-checkout-rules/assets/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
dealcoch-rule-row
Data Attributes
dealcoch_rulesdealcoch-rules-tabledealcoch-add-ruledealcoch-rule-template
FAQ

Frequently Asked Questions about Dealicious Conditional Checkout Rules for WooCommerce