Checkout Fields and File Upload for WooCommerce Security & Risk Analysis

wordpress.org/plugins/fields-and-file-upload

Easily add general or item-specific detail inputs and file uploads to the WooCommerce checkout page's additional information section.

100 active installs v1.2.3 PHP 7.0+ WP 4.6+ Updated Sep 23, 2025
checkoutfile-uploadorder-detailswoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Checkout Fields and File Upload for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

Checkout Fields and File Upload for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6mo ago
Risk Assessment

The 'fields-and-file-upload' plugin version 1.2.3 demonstrates a generally good security posture with a small attack surface and robust output escaping. All identified AJAX handlers have authentication checks, and there are no unprotected entry points. The absence of known CVEs and vulnerability history further contributes to this positive assessment, suggesting a history of stable and secure development.

However, the code analysis reveals a significant concern regarding SQL query security. All five SQL queries are executed without the use of prepared statements. This leaves the plugin vulnerable to SQL injection attacks, particularly if any of the data used in these queries originates from user input. While taint analysis did not reveal any unsanitized paths, the lack of prepared statements is a critical oversight that could be exploited through clever input manipulation.

Despite the excellent output escaping and controlled attack surface, the lack of prepared statements for all SQL queries is a notable weakness. The plugin benefits from a clean history and good practices in other areas, but this specific SQL vulnerability presents a tangible risk that should be addressed. Overall, the plugin is well-developed in many respects, but this critical oversight in database interaction necessitates caution.

Key Concerns

  • SQL queries without prepared statements
Vulnerabilities
None known

Checkout Fields and File Upload for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Checkout Fields and File Upload for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
5
0 prepared
Unescaped Output
0
44 escaped
Nonce Checks
1
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared5 total queries

Output Escaping

100% escaped44 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
process (src\includes\class-upload-api.php:133)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Checkout Fields and File Upload for WooCommerce Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_cffu_file_uploadsrc\includes\class-upload-api.php:22
noprivwp_ajax_cffu_file_uploadsrc\includes\class-upload-api.php:23
WordPress Hooks 14
actionwoocommerce_checkout_create_ordersrc\includes\class-data-hooks.php:24
actionbefore_delete_postsrc\includes\class-data-hooks.php:25
actionwoocommerce_before_delete_ordersrc\includes\class-data-hooks.php:26
actionwoocommerce_cleanup_sessionssrc\includes\class-data-hooks.php:28
filterwoocommerce_checkout_fieldssrc\includes\class-display.php:28
filterwoocommerce_form_field_cffu_file_uploadsrc\includes\class-display.php:29
actionwoocommerce_after_order_detailssrc\includes\class-display.php:30
actionadd_meta_boxessrc\includes\class-display.php:31
actionwoocommerce_email_after_order_tablesrc\includes\class-display.php:32
actioninitsrc\includes\class-settings.php:110
actionadmin_initsrc\includes\class-settings.php:111
actionadmin_menusrc\includes\class-settings.php:112
filterupload_dirsrc\includes\class-upload-api.php:175
filterwp_check_filetype_and_extsrc\includes\class-upload-api.php:176
Maintenance & Trust

Checkout Fields and File Upload for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedSep 23, 2025
PHP min version7.0
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Checkout Fields and File Upload for WooCommerce Developer Profile

Brandon Fowler

2 plugins · 200 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Checkout Fields and File Upload for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fields-and-file-upload/src/css/checkout.css/wp-content/plugins/fields-and-file-upload/src/js/checkout.js/wp-content/plugins/fields-and-file-upload/src/css/order.css
Script Paths
/wp-content/plugins/fields-and-file-upload/src/js/checkout.js
Version Parameters
fields-and-file-upload/src/css/checkout.css?ver=fields-and-file-upload/src/js/checkout.js?ver=fields-and-file-upload/src/css/order.css?ver=

HTML / DOM Fingerprints

CSS Classes
cffu-clear-fileinput-cffu-file-uploadcffu-order-detailscffu-order-detailcffu-file-field
Data Attributes
data-name
JS Globals
cffu_checkout_params
FAQ

Frequently Asked Questions about Checkout Fields and File Upload for WooCommerce