Extra Checkout Fee – Woo Security & Risk Analysis

wordpress.org/plugins/extra-checkout-fee-woo

Here is a short description of the plugin. This should be no more than 150 characters. No markup here.

10 active installs v1.0.0 PHP + WP 3.3+ Updated Aug 11, 2020
extra-chargeextra-feewoocommerce-extra-checkout-feewoocommerce-extra-fee
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Extra Checkout Fee – Woo Safe to Use in 2026?

Generally Safe

Score 85/100

Extra Checkout Fee – Woo has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The plugin "extra-checkout-fee-woo" v1.0.0 demonstrates a strong adherence to secure coding practices based on the provided static analysis. The absence of dangerous functions, reliance on prepared statements for all SQL queries, and proper output escaping indicate a solid foundation. Furthermore, the lack of file operations, external HTTP requests, and the clean taint analysis report suggest that sensitive data is likely handled with care. The plugin also has no recorded vulnerability history, which is a very positive sign of its ongoing security.

However, a significant concern arises from the complete absence of nonce checks and capability checks. While the current attack surface appears minimal (0 entry points), this omission is a critical weakness. If any new functionality is added that exposes entry points (AJAX, REST API, shortcodes, cron events) without these security measures, it could become highly vulnerable to Cross-Site Request Forgery (CSRF) or unauthorized actions by unauthenticated users. The plugin's current security is good due to its limited exposure, but its design lacks inherent defenses against common web vulnerabilities should its attack surface expand.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Extra Checkout Fee – Woo Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Extra Checkout Fee – Woo Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Extra Checkout Fee – Woo Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedincludes\class-extra-checkout-fee.php:142
filterwoocommerce_get_sections_checkoutincludes\class-extra-checkout-fee.php:156
filterwoocommerce_get_settings_checkoutincludes\class-extra-checkout-fee.php:157
actionwoocommerce_cart_calculate_feesincludes\class-extra-checkout-fee.php:170
actionwoocommerce_review_order_before_paymentincludes\class-extra-checkout-fee.php:171
Maintenance & Trust

Extra Checkout Fee – Woo Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedAug 11, 2020
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Extra Checkout Fee – Woo Developer Profile

Aslam Shekh

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Extra Checkout Fee – Woo

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/extra-checkout-fee-woo/assets/css/style.css/wp-content/plugins/extra-checkout-fee-woo/assets/js/extra-checkout-fee-public.js
Script Paths
/wp-content/plugins/extra-checkout-fee-woo/assets/js/extra-checkout-fee-public.js
Version Parameters
extra-checkout-fee-woo/assets/css/style.css?ver=extra-checkout-fee-woo/assets/js/extra-checkout-fee-public.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Extra Checkout Fee – Woo