همگام‌سازی سفارشات مهمان با پروفایل‌های کاربری ووکامرس Security & Risk Analysis

wordpress.org/plugins/guest-order-sync

همگام‌سازی سفارشات مهمان با پروفایل‌های کاربری بر اساس شماره تلفن. با پشتیبانی از شماره‌های تلفن ایران.

10 active installs v1.8 PHP 7.4+ WP 4.7+ Updated Sep 12, 2024
guest-ordersorder-syncphone-numberwoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is همگام‌سازی سفارشات مهمان با پروفایل‌های کاربری ووکامرس Safe to Use in 2026?

Generally Safe

Score 92/100

همگام‌سازی سفارشات مهمان با پروفایل‌های کاربری ووکامرس has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The guest-order-sync plugin v1.8 exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, raw SQL queries, unescaped output, file operations, or external HTTP requests is commendable. Furthermore, the analysis shows no taint flows, indicating no apparent paths for unsanitized data to enter the application. The plugin correctly implements capability checks, demonstrating an understanding of WordPress's permission system.

However, the complete lack of nonce checks, while not directly tied to identified vulnerabilities in this static analysis, represents a potential oversight. If the plugin were to introduce AJAX or REST API endpoints in the future without these checks, it could become susceptible to Cross-Site Request Forgery (CSRF) attacks. The plugin's vulnerability history is entirely clean, with no recorded CVEs, which is a positive indicator of its past security. This suggests a commitment to security or a lack of past discovery of vulnerabilities.

In conclusion, the plugin appears well-secured against common web vulnerabilities based on this analysis. The developer has followed many good security practices. The primary area for potential improvement lies in implementing nonce checks, particularly if the plugin's functionality is expanded to include more interactive features that could be targeted by CSRF attacks. The lack of any historical vulnerabilities is a significant strength, implying a robust development process or simply a lack of prior exposure.

Key Concerns

  • Missing nonce checks
Vulnerabilities
None known

همگام‌سازی سفارشات مهمان با پروفایل‌های کاربری ووکامرس Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

همگام‌سازی سفارشات مهمان با پروفایل‌های کاربری ووکامرس Release Timeline

v1.8Current
v1.7.1
Code Analysis
Analyzed Mar 16, 2026

همگام‌سازی سفارشات مهمان با پروفایل‌های کاربری ووکامرس Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
6 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped6 total outputs
Attack Surface

همگام‌سازی سفارشات مهمان با پروفایل‌های کاربری ووکامرس Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwoocommerce_checkout_order_processedGuest Order Sync.php:116
actionuser_registerGuest Order Sync.php:162
actionwp_loginGuest Order Sync.php:213
Maintenance & Trust

همگام‌سازی سفارشات مهمان با پروفایل‌های کاربری ووکامرس Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedSep 12, 2024
PHP min version7.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

همگام‌سازی سفارشات مهمان با پروفایل‌های کاربری ووکامرس Developer Profile

Ali Karimi

1 plugin · 10 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect همگام‌سازی سفارشات مهمان با پروفایل‌های کاربری ووکامرس

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
data-gos-phone-attribute
FAQ

Frequently Asked Questions about همگام‌سازی سفارشات مهمان با پروفایل‌های کاربری ووکامرس