EDD Purchase Gravatars Security & Risk Analysis
wordpress.org/plugins/edd-purchase-gravatarsDisplays Gravatars of customers who have purchased your product
Is EDD Purchase Gravatars Safe to Use in 2026?
Generally Safe
Score 85/100EDD Purchase Gravatars has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "edd-purchase-gravatars" plugin, version 1.0.5, exhibits a generally positive security posture based on the provided static analysis. The absence of identified CVEs and known vulnerability types in its history suggests a history of secure development or diligent patching. The plugin also demonstrates good practices by not utilizing dangerous functions and by exclusively using prepared statements for its SQL queries. Furthermore, the limited attack surface, with only one shortcode and no unprotected AJAX handlers or REST API routes, is a significant strength.
However, several areas raise concern and warrant attention. The most prominent issue is the low percentage of properly escaped output (15%). This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data or plugin-generated content might not be adequately sanitized before being displayed to users. The lack of nonce checks and capability checks on its sole entry point (the shortcode) is also a significant weakness, potentially allowing unauthorized actions or information leakage if the shortcode's functionality is sensitive. The presence of an external HTTP request, while not inherently a vulnerability, adds an external dependency that could be exploited if the target endpoint is compromised or if the request is not handled securely.
In conclusion, while the plugin benefits from a clean vulnerability history and sound SQL practices, the prevalent output escaping issue and the absence of essential security checks on its entry point are critical security weaknesses that significantly elevate its risk profile. Addressing these specific concerns should be the priority to improve the plugin's overall security.
Key Concerns
- Low percentage of properly escaped output
- Missing nonce checks on entry points
- Missing capability checks on entry points
- External HTTP request without clear handling
EDD Purchase Gravatars Security Vulnerabilities
EDD Purchase Gravatars Code Analysis
Output Escaping
EDD Purchase Gravatars Attack Surface
Shortcodes 1
WordPress Hooks 5
Maintenance & Trust
EDD Purchase Gravatars Maintenance & Trust
Maintenance Signals
Community Trust
EDD Purchase Gravatars Alternatives
EDD Favorites
edd-favorites
Favorite/Unfavorite downloads in Easy Digital Downloads with just 1 click.
EDD Purchase Rewards
edd-purchase-rewards
Increase sales and build customer loyalty by rewarding customers
EDD Free Download Text
edd-free-download-text
Change the button text of a free download
EDD Add To Cart Redirect
edd-add-to-cart-redirect
Redirect to any post/page/download when a download has been added the cart.
EDD Prevent Checkout
edd-prevent-checkout
Prevents customer from being able to checkout until a minimum cart total is reached
EDD Purchase Gravatars Developer Profile
17 plugins · 3K total installs
How We Detect EDD Purchase Gravatars
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/edd-purchase-gravatars/css/edd-purchase-gravatars.css/wp-content/plugins/edd-purchase-gravatars/js/edd-purchase-gravatars.js/wp-content/plugins/edd-purchase-gravatars/js/edd-purchase-gravatars.jsedd-purchase-gravatars/css/edd-purchase-gravatars.css?ver=edd-purchase-gravatars/js/edd-purchase-gravatars.js?ver=HTML / DOM Fingerprints
edd-purchase-gravatarsedd-pg-gravataredd-pg-purchase-gravatars-wrapperdata-edd-pg-payment-idedd_pg_vars[edd_purchase_gravatars]