Dokan Invoice Security & Risk Analysis

wordpress.org/plugins/dokan-invoice

PDF Invoicing system for Admin, Seller and Customer

500 active installs v1.2.7 PHP + WP 6.4+ Updated Dec 9, 2025
dokaninvoicemulti-sellermulti-vendorwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Dokan Invoice Safe to Use in 2026?

Generally Safe

Score 100/100

Dokan Invoice has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The Dokan Invoice plugin version 1.2.7 presents a generally positive security posture based on the static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events suggests a limited attack surface. Furthermore, the code signals indicate no dangerous functions, no raw SQL queries (all use prepared statements), no file operations, and no external HTTP requests. The lack of identified critical or high severity taint flows is also a strong indicator of robust security practices. The plugin also boasts a clean vulnerability history with zero known CVEs.

However, a significant concern arises from the output escaping. With one total output identified and 0% properly escaped, there is a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that originates from an untrusted source and is not properly sanitized before output can be exploited. While the attack surface and taint analysis appear clean, this single, unescaped output is a critical flaw that could be leveraged if user-supplied data is involved.

In conclusion, Dokan Invoice 1.2.7 has strengths in its limited attack surface, secure database interaction, and lack of historical vulnerabilities. Nevertheless, the complete absence of output escaping for identified outputs represents a serious security weakness that needs immediate attention. This unescaped output risk overshadows the otherwise positive findings.

Key Concerns

  • Output escaping is not properly implemented
Vulnerabilities
None known

Dokan Invoice Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Dokan Invoice Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Dokan Invoice Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionbefore_woocommerce_initdokan-invoice.php:87
actioninitdokan-invoice.php:88
actionplugins_loadeddokan-invoice.php:89
actionadmin_noticesdokan-invoice.php:134
filterdokan_my_account_my_sub_orders_actionsdokan-invoice.php:183
filterwpo_wcpdf_shop_namedokan-invoice.php:184
filterwpo_wcpdf_shop_addressdokan-invoice.php:185
filterwpo_wcpdf_check_privsdokan-invoice.php:186
Maintenance & Trust

Dokan Invoice Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedDec 9, 2025
PHP min version
Downloads27K

Community Trust

Rating0/100
Number of ratings0
Active installs500
Developer Profile

Dokan Invoice Developer Profile

weDevs

20 plugins · 113K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
366 days
View full developer profile
Detection Fingerprints

How We Detect Dokan Invoice

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dokan-invoice/assets/css/style.css
Version Parameters
dokan-invoice/assets/css/style.css?ver=

HTML / DOM Fingerprints

HTML Comments
Copyright (c) 2017 weDevs (email: info@wedevs.com). All rights reserved.Released under the GPL licensehttp://www.opensource.org/licenses/gpl-license.phpThis is an add-on for WordPress+18 more
FAQ

Frequently Asked Questions about Dokan Invoice