Engage for WooCommerce Security & Risk Analysis

wordpress.org/plugins/engage-by-zubi

Engage is a Growth Platform for E-commerce. Using Engage, an e-commerce store get all the tools required to drastically enhance the results of everyth …

10 active installs v2023.9.2 PHP + WP 4.9.10+ Updated Sep 25, 2023
cross-sellecommerce-optimizationincrease-salesproduct-recommendationupsell
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Engage for WooCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

Engage for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "engage-by-zubi" v2023.9.2 plugin exhibits a mixed security posture. While it demonstrates good practices by avoiding dangerous functions, utilizing prepared statements for all SQL queries, and having no known historical CVEs, significant concerns arise from its attack surface. A substantial portion of its AJAX handlers lack proper authentication checks, presenting a broad entry point for potential attackers to exploit. The taint analysis, although not revealing critical or high-severity issues, did identify flows with unsanitized paths, indicating a potential for issues if data is not handled with extreme care at these points. The limited number of capability checks and only one nonce check on the entire plugin further exacerbates the risk associated with the unprotected AJAX endpoints. The low percentage of properly escaped output is also a notable weakness, increasing the likelihood of cross-site scripting (XSS) vulnerabilities being present, especially when combined with unprotected input sources.

Key Concerns

  • High number of unprotected AJAX handlers
  • Flows with unsanitized paths identified
  • Low percentage of properly escaped output
  • Limited nonce checks
  • Limited capability checks
Vulnerabilities
None known

Engage for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Engage for WooCommerce Release Timeline

v2023.9.2Current
v2023.9.1
v2023.5.1
v2023.5.0
v2023.4.0
v2022.10.0
v2021.11.0
v2021.10.1
v2021.10.0
v1.3.4
v1.3.3
v1.3.2
v1.3.1
v1.0.17
v1.0.16
v1.0.15
v1.0.14
v1.0.13
v1.0.12
v1.0.10
Code Analysis
Analyzed Apr 16, 2026

Engage for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
165
95 escaped
Nonce Checks
1
Capability Checks
2
File Operations
1
External Requests
4
Bundled Libraries
0

Output Escaping

37% escaped260 total outputs
Data Flows · Security
3 unsanitized

Data Flow Analysis

4 flows3 with unsanitized paths
zl_ajax_get_product (ebz.php:1946)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
8 unprotected

Engage for WooCommerce Attack Surface

Entry Points11
Unprotected8

AJAX Handlers 8

noprivwp_ajax_zl_get_cartebz.php:83
authwp_ajax_zl_get_cartebz.php:88
noprivwp_ajax_zl_ajax_productebz.php:152
authwp_ajax_zl_ajax_productebz.php:156
authwp_ajax_engage_connectionebz.php:198
authwp_ajax_engage_dashboardebz.php:199
authwp_ajax_engage_product_rec_submitebz.php:200
authwp_ajax_engage_update_legacy_recebz.php:201

Shortcodes 3

[zlt_rec] ebz.php:121
[zlt] ebz.php:125
[zlt_default] ebz.php:129
WordPress Hooks 8
actionadmin_initebz.php:78
actionwoocommerce_before_checkout_formebz.php:96
actionadmin_menuebz.php:101
actionadmin_noticesebz.php:105
actionwp_enqueue_scriptsebz.php:136
actionwoocommerce_before_single_productebz.php:143
actionwoocommerce_thankyouebz.php:148
actionwoocommerce_after_shop_loop_itemebz.php:160
Maintenance & Trust

Engage for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedSep 25, 2023
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

Engage for WooCommerce Developer Profile

zubiai

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Engage for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/engage-by-zubi/assets/css/main.css/wp-content/plugins/engage-by-zubi/assets/js/app.js
Script Paths
/wp-content/plugins/engage-by-zubi/includes/shortcode.php
Version Parameters
/wp-content/plugins/engage-by-zubi/assets/css/main.css?ver=/wp-content/plugins/engage-by-zubi/assets/js/app.js?ver=

HTML / DOM Fingerprints

CSS Classes
engage-by-zubi-container
HTML Comments
<!-- engage-by-zubi Recommendation start --><!-- engage-by-zubi Recommendation end -->
Data Attributes
data-engage-product-iddata-engage-widget-id
JS Globals
window.engage_zubi_configvar engage_zubi_api_url
REST Endpoints
/wp-json/engage-by-zubi/v1/products/wp-json/engage-by-zubi/v1/recommendations
Shortcode Output
[zlt_rec][zlt][zlt_default]
FAQ

Frequently Asked Questions about Engage for WooCommerce