Deals Security & Risk Analysis

wordpress.org/plugins/deals

It’s a MIT-licensed (can be used in premium themes), high quality, native and responsive WordPress plugin to create and view slider-based deals

10 active installs v6.1.10-1 PHP 5.6+ WP 4.6+ Updated Aug 12, 2019
dealdealsofferoffersslider
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Deals Safe to Use in 2026?

Generally Safe

Score 85/100

Deals has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "deals" plugin v6.1.10-1 exhibits a generally strong security posture based on the provided static analysis. The absence of any recorded CVEs and the complete lack of vulnerabilities in its history are significant positive indicators. The code analysis reveals a good practice in handling SQL queries, with a high percentage (82%) using prepared statements, and a reasonable rate of output escaping (81%). The plugin also has a relatively small attack surface with no exposed AJAX handlers, REST API routes, or shortcodes without authentication checks, which is a commendable security feature.

However, there are a few areas that warrant attention and introduce some risk. The presence of two taint flows with unsanitized paths, even though not classified as critical or high severity in the provided data, suggests potential avenues for injection vulnerabilities. The complete absence of nonce checks across all entry points, coupled with only one capability check, is a significant concern for a plugin that likely handles sensitive data or user interactions. Furthermore, the inclusion of a bundled library, DataTables v1.10.18, which is quite old, presents a risk of unpatched vulnerabilities within that library that could be exploited. While the plugin itself has a clean history, these code-level observations indicate areas for improvement to further harden its security.

In conclusion, the "deals" plugin benefits from a historically clean record and a limited external attack surface. The prevalent use of prepared statements and output escaping is also positive. Nevertheless, the identified taint flows and the lack of robust authentication and authorization mechanisms (nonce checks) present notable risks. The bundled outdated library further adds to the potential vulnerability surface. Addressing these specific code-level concerns would significantly enhance the plugin's overall security.

Key Concerns

  • Taint flows with unsanitized paths found
  • Missing nonce checks on entry points
  • Bundled outdated library (DataTables v1.10.18)
  • Low number of capability checks
Vulnerabilities
None known

Deals Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Deals Code Analysis

Dangerous Functions
0
Raw SQL Queries
9
41 prepared
Unescaped Output
163
681 escaped
Nonce Checks
0
Capability Checks
1
File Operations
9
External Requests
0
Bundled Libraries
1

Bundled Libraries

DataTables1.10.18

SQL Query Safety

82% prepared50 total queries

Output Escaping

81% escaped844 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
getValidValueInput (Models\Validation\StaticValidator.php:1611)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Deals Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 22
filterbody_classControllers\Front\AssetController.php:91
actionadmin_noticesControllers\MainController.php:72
actionadmin_noticesControllers\MainController.php:82
actionadmin_noticesControllers\MainController.php:92
actionadmin_noticesControllers\MainController.php:113
filterplugin_row_metaControllers\MainController.php:133
actionnetwork_admin_menuControllers\MainController.php:153
filteradmin_footer_textControllers\MainController.php:155
filternetwork_admin_menuControllers\MainController.php:157
actionadmin_menuControllers\MainController.php:167
filteradmin_footer_textControllers\MainController.php:169
filteradmin_menuControllers\MainController.php:171
actionwpmu_new_blogControllers\MainController.php:178
actiondelete_blogControllers\MainController.php:190
actioninitControllers\MainController.php:195
actionadmin_headControllers\MainController.php:717
actionadmin_noticesControllers\MainController.php:728
actionadmin_headControllers\MainController.php:778
actionadmin_noticesControllers\MainController.php:797
actionwp_headControllers\MainController.php:871
actionadmin_noticesControllers\MainController.php:1043
actionadmin_noticesControllers\MainController.php:1060
Maintenance & Trust

Deals Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedAug 12, 2019
PHP min version5.6
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Deals Developer Profile

KestutisIT

4 plugins · 6K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Deals

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/deals/Assets/css/frontend.css/wp-content/plugins/deals/Assets/js/frontend.js/wp-content/plugins/deals/Assets/css/main.css/wp-content/plugins/deals/Assets/js/main.js
Script Paths
/wp-content/plugins/deals/Assets/js/DealsMain.js
Version Parameters
deals/Assets/css/frontend.css?ver=deals/Assets/js/frontend.js?ver=deals/Assets/css/main.css?ver=deals/Assets/js/main.js?ver=slick/slick.js?ver=slick/slick.min.js?ver=deals/Assets/js/DealsMain.js?ver=1.0

HTML / DOM Fingerprints

CSS Classes
deals-main-wrapperdeals-deals-wrapperdeals-deal-itemdeals-deal-titledeals-deal-descriptiondeals-deal-pricedeals-deal-discount-pricedeals-deal-countdown+10 more
Data Attributes
data-deals-settingsdata-deals-iddata-deals-titledata-deals-descriptiondata-deals-pricedata-deals-discount-price+5 more
JS Globals
Deals
REST Endpoints
/wp-json/deals/v1/deals/wp-json/deals/v1/deal
Shortcode Output
[deals][deals_slider]
FAQ

Frequently Asked Questions about Deals