Email Attachment by Order Status & Products Security & Risk Analysis

wordpress.org/plugins/email-attachment-by-order-status-products

Send custom attachments with WooCommerce order emails based on order status and purchased products.

60 active installs v1.0.1 PHP 7.0+ WP 6.2+ Updated Jun 12, 2025
email-attachmentwoocommerce
78
B · Generally Safe
CVEs total1
Unpatched1
Last CVEJul 14, 2025
Safety Verdict

Is Email Attachment by Order Status & Products Safe to Use in 2026?

Mostly Safe

Score 78/100

Email Attachment by Order Status & Products is generally safe to use. 1 past CVE were resolved. Keep it updated.

1 known CVE 1 unpatched Last CVE: Jul 14, 2025Updated 9mo ago
Risk Assessment

The plugin "email-attachment-by-order-status-products" v1.0.1 exhibits a mixed security posture. While it demonstrates good practices such as using prepared statements for all SQL queries and a high percentage of properly escaped output, significant concerns arise from its attack surface and lack of input validation. All four identified AJAX handlers lack authentication checks, presenting a substantial risk for unauthorized access or manipulation of plugin functionality. Furthermore, the presence of two unsanitized flows in taint analysis, even if not reaching critical severity, indicates potential vulnerabilities that could be exploited if user-supplied data is not properly handled.

The vulnerability history reveals a concerning trend. The plugin has one known medium-severity CVE, which is currently unpatched. This indicates a recurring pattern of security flaws, specifically relating to Cross-Site Scripting. The fact that the last vulnerability was dated in the future (2025-07-14) may suggest an error in the reporting, but the existence of an unpatched CVE is a direct indicator of an existing, known security weakness that could be exploited.

In conclusion, while the plugin has strengths in its data handling for SQL and output, the unprotected AJAX endpoints and past vulnerabilities necessitate caution. The lack of proper authentication on AJAX handlers is a critical oversight, and the unpatched CVE poses an immediate threat. Developers should prioritize addressing these critical areas to improve the overall security of the plugin.

Key Concerns

  • Unprotected AJAX handlers
  • Unpatched CVE (medium severity)
  • Flows with unsanitized paths (taint analysis)
  • Missing nonce checks on AJAX
Vulnerabilities
1

Email Attachment by Order Status & Products Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-49957medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Email Attachment by Order Status & Products <= 1.0.1 - Reflected Cross-Site Scripting

Jul 14, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Email Attachment by Order Status & Products Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
67 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

96% escaped70 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
wot_get_product_type (backend\wot-email-attachment-backend-custom-functions.php:464)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
4 unprotected

Email Attachment by Order Status & Products Attack Surface

Entry Points4
Unprotected4

AJAX Handlers 4

authwp_ajax_wot_get_product_typebackend\wot-email-attachment-backend-custom-functions.php:562
noprivwp_ajax_wot_get_product_typebackend\wot-email-attachment-backend-custom-functions.php:563
authwp_ajax_wot_remove_order_status_rowbackend\wot-email-attachment-backend-custom-functions.php:581
noprivwp_ajax_wot_remove_order_status_rowbackend\wot-email-attachment-backend-custom-functions.php:582
WordPress Hooks 7
actionadmin_menubackend\wot-email-attachment-backend-custom-functions.php:6
actionadmin_initbackend\wot-email-attachment-backend-custom-functions.php:19
filterwoocommerce_email_attachmentsfrontend\wot-email-attachment-frontend-custom-functions.php:8
actionwoocommerce_checkout_update_order_metafrontend\wot-email-attachment-frontend-custom-functions.php:155
actionadmin_initwot-email-attachment.php:17
actionadmin_noticeswot-email-attachment.php:22
actioninitwot-email-attachment.php:72
Maintenance & Trust

Email Attachment by Order Status & Products Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJun 12, 2025
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs60
Developer Profile

Email Attachment by Order Status & Products Developer Profile

Weboccult Technologies Pvt Ltd

8 plugins · 550 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Email Attachment by Order Status & Products

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/email-attachment-by-order-status-products/backend/css/wot-ea-style.css/wp-content/plugins/email-attachment-by-order-status-products/backend/js/wot-ea-scripts.js
Script Paths
/wp-content/plugins/email-attachment-by-order-status-products/backend/js/wot-ea-scripts.js

HTML / DOM Fingerprints

Data Attributes
data-wot-ea-id
JS Globals
wp.media
FAQ

Frequently Asked Questions about Email Attachment by Order Status & Products