Enable Edd Comment Security & Risk Analysis

wordpress.org/plugins/enable-edd-comment

Active Comments For Easy Digital Downloads (EDD) in 1 Click!

30 active installs v2 PHP + WP 5.3+ Updated Aug 1, 2020
active-edd-commenteasy-digital-downloads-commentedd-commentedd-reviewenable-edd-comment
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Enable Edd Comment Safe to Use in 2026?

Generally Safe

Score 85/100

Enable Edd Comment has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The static analysis of the 'enable-edd-comment' v2 plugin indicates a strong initial security posture with no identified attack surface in terms of AJAX handlers, REST API routes, shortcodes, or cron events. The absence of dangerous functions and the consistent use of prepared statements for SQL queries are positive indicators. However, a significant concern arises from the 100% of output operations lacking proper escaping, posing a risk of Cross-Site Scripting (XSS) vulnerabilities if any user-supplied data is displayed without sanitization. The plugin also has no recorded vulnerability history, suggesting either a historically secure codebase or a lack of thorough historical analysis.

While the lack of identified vulnerabilities and attack vectors is reassuring, the unescaped output is a critical weakness that needs immediate attention. This oversight could allow malicious scripts to be injected into the site through the plugin's output. The absence of nonce and capability checks, though not directly flagged as vulnerabilities given the lack of entry points, means that if any entry points were to be inadvertently introduced or discovered, they would be unprotected.

In conclusion, 'enable-edd-comment' v2 exhibits strengths in its minimal attack surface and secure data handling for SQL. However, the pervasive issue of unescaped output represents a tangible and significant security risk. The clean vulnerability history is a positive sign, but it should not overshadow the identified code quality issues. Addressing the unescaped output is paramount to improving the plugin's overall security.

Key Concerns

  • Output escaping is not properly handled
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Enable Edd Comment Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Enable Edd Comment Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

Enable Edd Comment Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_enqueue_scriptsclass-enable-edd-comment.php:8
actionadmin_menuclass-enable-edd-comment.php:9
actionadmin_initclass-enable-edd-comment.php:10
filteredd_download_supportsclass-enable-edd-comment.php:11
actionplugins_loadedclass-enable-edd-comment.php:13
Maintenance & Trust

Enable Edd Comment Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedAug 1, 2020
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs30
Alternatives

Enable Edd Comment Alternatives

No alternatives data available yet.

Developer Profile

Enable Edd Comment Developer Profile

KHL32

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Enable Edd Comment

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/enable-edd-comment/assets/css/style.css
Version Parameters
enable-edd-comment/assets/css/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
green
FAQ

Frequently Asked Questions about Enable Edd Comment