Eshop Magic Security & Risk Analysis

wordpress.org/plugins/eshop-magic

Enhances the eShop plugin. Tweak the look and feel. Check your settings. Assistance with problems.

10 active installs v1.3.2 PHP + WP 3.3+ Updated Apr 6, 2013
customizeeshoplogstransactionstroubleshooting
85
A · Safe
CVEs total1
Unpatched0
Last CVEOct 12, 2012
Safety Verdict

Is Eshop Magic Safe to Use in 2026?

Generally Safe

Score 85/100

Eshop Magic has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Oct 12, 2012Updated 13yr ago
Risk Assessment

The eshop-magic v1.3.2 plugin exhibits a concerning security posture primarily due to significant weaknesses in output escaping and the presence of dangerous functions without apparent controls. While the static analysis reveals a surprisingly small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events, this lack of entry points does not negate the risks within the code itself. The plugin utilizes the `unserialize` function three times, which is a known vector for remote code execution if not handled with extreme care and validation. Furthermore, a critical observation is that 100% of its output is not properly escaped, exposing users to potential Cross-Site Scripting (XSS) vulnerabilities through any data displayed by the plugin.

The vulnerability history, although old with the last vulnerability in 2012, indicates a past medium severity issue related to Path Traversal. While there are no currently unpatched CVEs, the age of the vulnerability and the lack of recent updates to address fundamental security practices like output escaping suggest a plugin that may be outdated and potentially unmaintained. The absence of nonce and capability checks, along with a lack of taint analysis flows being analyzed (suggesting either no such flows or insufficient analysis), leaves potential for various injection attacks if any of the entry points were to be discovered or if the internal code is more vulnerable than the limited static analysis suggests. The plugin's reliance on prepared statements for SQL queries is a positive, but it is overshadowed by the other critical flaws.

In conclusion, while the plugin presents a minimal direct attack surface in this version, the internal code possesses significant security risks. The lack of output escaping is a major concern for XSS, and the use of `unserialize` without clear sanitization is a critical vulnerability waiting to be exploited. The historical path traversal vulnerability further reinforces the need for caution. The strengths lie in its SQL handling and limited immediate entry points, but these are outweighed by the severe and fundamental security flaws in its code execution and output handling.

Key Concerns

  • Dangerous function 'unserialize' used without apparent validation
  • 100% of output not properly escaped (XSS risk)
  • 0 Nonce checks present
  • 0 Capability checks present
  • Past medium vulnerability (Path Traversal)
  • No Taint Analysis performed/reported
Vulnerabilities
1

Eshop Magic Security Vulnerabilities

CVEs by Year

1 CVE in 2012
2012
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

WF-a2363a40-b627-44da-af8e-98821685c3ea-eshop-magicmedium · 5.3Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Eshop Magic < 0.2 - Arbitrary File Read

Oct 12, 2012 Patched in 0.2 (4120d)
Code Analysis
Analyzed Mar 17, 2026

Eshop Magic Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
1 prepared
Unescaped Output
17
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$sent = unserialize( $sent );controllers\eShopMagic_troubleshooter.controller.php:160
unserialize$received = unserialize( $received );controllers\eShopMagic_troubleshooter.controller.php:161
unserialize$eshopoptions = unserialize( $eshopoptions );controllers\eShopMagic_troubleshooter.controller.php:162

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped17 total outputs
Attack Surface

Eshop Magic Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
filtereshop_rename_ship_zonecontrollers\eShopMagic_customize.controller.php:133
filtereShopCheckoutLinksAttrcontrollers\eShopMagic_customize.controller.php:134
filtereshop_gateway_details_emailcontrollers\eShopMagic_customize.controller.php:137
actioneshop_send_customer_emailcontrollers\eShopMagic_customize.controller.php:138
filtergettextcontrollers\eShopMagic_customize.controller.php:141
filtereshop_currency_codescontrollers\eShopMagic_customize.controller.php:142
filtereshop_ajax_cartcontrollers\eShopMagic_customize.controller.php:143
filtereshopCartSuccesscontrollers\eShopMagic_customize.controller.php:144
filtereshopCartQtyErrorcontrollers\eShopMagic_customize.controller.php:145
filtereshop_use_cookiecontrollers\eShopMagic_customize.controller.php:146
filtereshop_authorizenet_xrelaycontrollers\eShopMagic_customize.controller.php:149
filtereshopCheckoutReqdcontrollers\eShopMagic_customize.controller.php:152
actionwpcontrollers\eShopMagic_troubleshooter.controller.php:55
filterthe_contentcontrollers\eShopMagic_troubleshooter.controller.php:56
Maintenance & Trust

Eshop Magic Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedApr 6, 2013
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Eshop Magic Developer Profile

CPK Web Solutions

4 plugins · 240 total installs

69
trust score
Avg Security Score
85/100
Avg Patch Time
4120 days
View full developer profile
Detection Fingerprints

How We Detect Eshop Magic

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Eshop Magic