Force Sells for Variations Security & Risk Analysis

wordpress.org/plugins/force-sells-for-variations

Adds products to specific variations and synchronizes quantities. Removes quantity change and remove buttons for these added products.

0 active installs v1.0 PHP 7.0+ WP 5.0+ Updated Aug 5, 2024
bundlesforce-sellslinked-productsvariationswoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Force Sells for Variations Safe to Use in 2026?

Generally Safe

Score 92/100

Force Sells for Variations has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "force-sells-for-variations" plugin v1.0 exhibits a strong security posture based on the provided static analysis and vulnerability history. The code appears to be well-written, with no dangerous functions identified, all SQL queries utilizing prepared statements, and all output properly escaped. Furthermore, there are no file operations or external HTTP requests, which generally reduces the attack surface. The complete absence of identified CVEs and no recorded past vulnerabilities further bolsters confidence in its security. The lack of any detected taint flows with unsanitized paths is also a very positive indicator.

However, a notable concern arises from the complete absence of any detected entry points (AJAX handlers, REST API routes, shortcodes, cron events) and a zero count for nonce checks and capability checks. While this might imply a minimal or inert plugin, it also means there's no data to confirm if these crucial security mechanisms are implemented correctly or at all for any potential, albeit undiscovered, entry points. This lack of observable security implementations, even in a plugin with a clean history, warrants a degree of caution as it doesn't actively demonstrate the presence of protective measures. The plugin's strengths lie in its clean coding practices and lack of historical issues, but the lack of observable attack surface and security checks, while potentially indicative of a safe design, also prevents full validation of its security controls.

Key Concerns

  • No nonce checks detected
  • No capability checks detected
  • No attack surface detected
Vulnerabilities
None known

Force Sells for Variations Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Force Sells for Variations Release Timeline

v1.0Current
Code Analysis
Analyzed Apr 6, 2026

Force Sells for Variations Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Force Sells for Variations Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionwoocommerce_before_calculate_totalsforce-sells-for-variations.php:20
actionwoocommerce_after_cart_item_quantity_updateforce-sells-for-variations.php:54
actionwoocommerce_cart_item_removedforce-sells-for-variations.php:73
filterwoocommerce_cart_item_nameforce-sells-for-variations.php:92
filterwoocommerce_cart_item_quantityforce-sells-for-variations.php:107
filterwoocommerce_cart_item_remove_linkforce-sells-for-variations.php:108
filterwoocommerce_cart_contents_countforce-sells-for-variations.php:126
Maintenance & Trust

Force Sells for Variations Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedAug 5, 2024
PHP min version7.0
Downloads828

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Force Sells for Variations Developer Profile

Benny Windolph

1 plugin · 0 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Force Sells for Variations

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<small>Part of "%s"</small>
FAQ

Frequently Asked Questions about Force Sells for Variations