Failed order discount Security & Risk Analysis

wordpress.org/plugins/failed-order-discount

Fixes the issue in WooCommerce where failed orders prevent discount codes from being reused. ---

0 active installs v1.0.0 PHP + WP + Updated Jan 7, 2025
couponsdiscount-codesfailed-orderswoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Failed order discount Safe to Use in 2026?

Generally Safe

Score 92/100

Failed order discount has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "failed-order-discount" v1.0.0 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified attack surface points, including AJAX handlers, REST API routes, shortcodes, or cron events, significantly reduces the potential for external exploitation. Furthermore, the code signals are exceptionally clean, with no dangerous functions, file operations, external HTTP requests, or external HTTP requests. SQL queries are exclusively handled via prepared statements, and all output is properly escaped, indicating adherence to secure coding principles for these common vulnerability vectors. The lack of identified nonce or capability checks is noted, but given the zero attack surface, this doesn't immediately translate to a risk in the current version. The plugin also has no recorded vulnerability history, which is a positive indicator. However, the absence of any observed taint flows or uninitialized variables, while good, might also be a reflection of a very small or straightforward code base that hasn't been subjected to extensive taint analysis scenarios. Overall, this plugin appears to be developed with security in mind, but the very limited attack surface and lack of complex functionality mean its security is largely unproven against more sophisticated attack methods. The absence of explicit capability checks, while not an immediate risk due to the zero attack surface, is a potential weakness if new entry points are introduced in future versions without proper authorization checks.

Key Concerns

  • 0 Nonce checks present
  • 0 Capability checks present
Vulnerabilities
None known

Failed order discount Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Failed order discount Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Failed order discount Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwoocommerce_order_status_failedfailed-order-discount.php:57
Maintenance & Trust

Failed order discount Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedJan 7, 2025
PHP min version
Downloads650

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Failed order discount Developer Profile

Daniel Harper

1 plugin · 0 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Failed order discount

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Failed order discount