Fomo for WooCommerce Security & Risk Analysis

wordpress.org/plugins/fomo

Fomo displays recent orders on your WooCommerce storefront.

20 active installs v2.0.12 PHP + WP 4.4+ Updated Aug 11, 2025
fomonotificationsorderssocial-proofwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Fomo for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

Fomo for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7mo ago
Risk Assessment

The 'fomo' plugin v2.0.12 presents a generally positive security posture, exhibiting strong practices in several key areas. The complete absence of known CVEs and unpatched vulnerabilities is a significant strength, suggesting a well-maintained and secure development history. Furthermore, the code analysis reveals a robust approach to SQL queries, with 100% utilizing prepared statements, mitigating risks of SQL injection. The use of nonces and capability checks, although present only once each, demonstrates awareness of WordPress security mechanisms for protecting sensitive operations.

However, there are areas that warrant caution. The presence of two 'dangerous functions', specifically `create_function` and `unserialize`, introduces potential risks if not handled with extreme care. `create_function` is deprecated and can lead to code injection if user-supplied data is used in its creation, while `unserialize` is notoriously susceptible to object injection vulnerabilities if the serialized data originates from an untrusted source. The static analysis also indicates that only 64% of output is properly escaped. This leaves a significant portion of output potentially vulnerable to cross-site scripting (XSS) attacks. While the attack surface appears minimal with no unprotected entry points, the combination of these specific code signals raises concerns.

In conclusion, while the plugin benefits from a clean vulnerability history and secure SQL practices, the identified dangerous functions and partially unescaped output are notable weaknesses. These issues, though not currently exploited according to historical data, represent potential avenues for attack. A balanced assessment is that the plugin is likely secure for most use cases, but sites handling highly sensitive data or those that extensively customize plugin output might want to investigate these specific areas further.

Key Concerns

  • Presence of 'create_function'
  • Presence of 'unserialize'
  • Output escaping is not 100%
Vulnerabilities
None known

Fomo for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Fomo for WooCommerce Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
8
14 escaped
Nonce Checks
1
Capability Checks
1
File Operations
56
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

create_functionreturn create_function('$_action, &$self, $_text', $init_crypt . 'if ($_action == "encrypt") { ' . $phpseclib\Crypt\Base.php:2542
unserializeextract(unserialize($partial));phpseclib\Crypt\RSA.php:642

Output Escaping

64% escaped22 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
fomofwc_handle_form (woocommerce-plugin-fomo-v2.php:279)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Fomo for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwp_enqueue_scriptswoocommerce-plugin-fomo-v2.php:28
actionadmin_menuwoocommerce-plugin-fomo-v2.php:43
actionadmin_noticeswoocommerce-plugin-fomo-v2.php:312
actionadmin_initwoocommerce-plugin-fomo-v2.php:318
Maintenance & Trust

Fomo for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedAug 11, 2025
PHP min version
Downloads10K

Community Trust

Rating84/100
Number of ratings5
Active installs20
Developer Profile

Fomo for WooCommerce Developer Profile

Fomo

2 plugins · 30 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Fomo for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fomo/dist/css/fomo.css/wp-content/plugins/fomo/dist/js/fomo.js
Script Paths
https://fomo.com/api/v1/
Version Parameters
fomo/dist/css/fomo.css?ver=fomo/dist/js/fomo.js?ver=

HTML / DOM Fingerprints

CSS Classes
fomofwc-admin-noticefomofwc-main-settings-wrapperfomofwc-fomo-logo
HTML Comments
<!-- Fomofwc admin notice --><!-- Fomofwc main settings wrapper -->
Data Attributes
data-fomofwc-client-iddata-fomofwc-consumer-keydata-fomofwc-consumer-secret
JS Globals
window.fomofwc_settingsvar fomofwc_settings =
REST Endpoints
/wp-json/fomofwc/v1/settings
Shortcode Output
[fomo_display_orders]
FAQ

Frequently Asked Questions about Fomo for WooCommerce