EasySell Security & Risk Analysis

wordpress.org/plugins/easysell

EasySell is simple and light-weight express sell/checkout plugin where you can sell using Paypal or offline payment. Easy setup in less than 5 mins.

10 active installs v1.0 PHP + WP 2.5.1+ Updated Jan 25, 2016
carteasy-sellno-paypalofflinepayment
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EasySell Safe to Use in 2026?

Generally Safe

Score 85/100

EasySell has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "easysell" v1.0 plugin presents a generally positive security posture based on the provided static analysis and vulnerability history. The absence of known vulnerabilities and the careful implementation of prepared statements for SQL queries are strong indicators of good development practices. The plugin also demonstrates a low attack surface with no detected AJAX handlers or REST API routes requiring immediate attention for authentication.

However, there are areas for improvement. The code signals reveal a concern with output escaping, where 36% of outputs are not properly escaped. This could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is present in these unescaped outputs. Furthermore, the lack of nonce checks across the plugin's entry points, coupled with a single capability check and no detected taint flows, suggests a potential for insufficient authorization checks or overlooked attack vectors, although the limited attack surface mitigates this risk significantly at present. The plugin's history of zero vulnerabilities further strengthens its current security standing, indicating a proactive or fortunate development path thus far.

In conclusion, "easysell" v1.0 exhibits strengths in its SQL handling and lack of historical vulnerabilities. The primary weakness lies in its output escaping and the absence of comprehensive nonce checks on its single entry point. While the current risk appears low due to a small attack surface and no critical detected issues, addressing the output escaping and considering nonce checks for enhanced security would be prudent.

Key Concerns

  • Insufficient output escaping (36% unescaped)
  • No nonce checks on entry points
Vulnerabilities
None known

EasySell Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

EasySell Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
7 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

64% escaped11 total outputs
Attack Surface

EasySell Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[easy_sell_button] easy-sell.php:13
WordPress Hooks 3
actionadmin_menueasy-sell.php:14
actionadmin_initeasy-sell.php:16
actiontemplate_redirecteasy-sell.php:17
Maintenance & Trust

EasySell Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedJan 25, 2016
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

EasySell Developer Profile

Spiker

4 plugins · 70 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect EasySell

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
easybuyboxeasysellform
Data Attributes
id="uniquenamename="txtProdName"name="txtQuantity"name="txtName"name="txtEmail"name="txtPhone"+3 more
JS Globals
ReverseContentDisplay
Shortcode Output
<h3>Buy: <strong> Details: </strong><strong>Price:</strong><strong>Quantity:</strong>
FAQ

Frequently Asked Questions about EasySell