i-Refer Security & Risk Analysis

wordpress.org/plugins/i-refer

Transform online referrals with i-Refer. Connect your brand to a targeted audience and get rewarded for referrals with instant payments.

10 active installs v2.0.8 PHP 7.4+ WP 5.3+ Updated Jan 27, 2025
affiliate-marketingecommercereferrals
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is i-Refer Safe to Use in 2026?

Generally Safe

Score 92/100

i-Refer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the i-refer plugin version 2.0.8 exhibits a generally strong security posture with no identified critical vulnerabilities. The absence of known CVEs and a clean vulnerability history suggest that the developers have a good track record of addressing security issues. The code also demonstrates good practices by using prepared statements for its single SQL query and properly escaping a high percentage of its outputs. The limited attack surface with no unprotected entry points is also a positive indicator.

However, there are some areas that warrant attention. The complete absence of nonce checks and capability checks, particularly given the presence of file operations and external HTTP requests, represents a significant potential risk. While the static analysis didn't identify any direct flows indicating these vulnerabilities, the lack of these fundamental WordPress security mechanisms leaves the plugin susceptible to various attacks if new entry points or vulnerabilities are introduced in the future or if the existing ones are indirectly exploitable. The presence of file operations and external HTTP requests without explicit authorization checks is a concern that could lead to unauthorized actions or information disclosure.

In conclusion, while the plugin is currently in a seemingly secure state with no known vulnerabilities and good coding practices in SQL and output handling, the complete lack of nonce and capability checks for all identified entry points is a notable weakness. This omission significantly increases the potential risk of privilege escalation or unauthorized operations, especially when considering the plugin's ability to perform file operations and external requests. Addressing these checks would greatly enhance the plugin's overall security.

Key Concerns

  • Missing nonce checks on all entry points
  • Missing capability checks on all entry points
  • File operations without explicit auth checks
  • External HTTP requests without explicit auth checks
  • Low percentage of output escaping (6%)
Vulnerabilities
None known

i-Refer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

i-Refer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
1
16 escaped
Nonce Checks
0
Capability Checks
0
File Operations
4
External Requests
2
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

94% escaped17 total outputs
Attack Surface

i-Refer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
filterwoocommerce_payment_gatewaysengine\Initialize.php:80
actioniniti-refer.php:43
actionadmin_initi-refer.php:52
actionadmin_noticesi-refer.php:58
actionplugins_loadedi-refer.php:100
actionadmin_noticesi-refer.php:108
filterwoocommerce_available_payment_gatewaysintegrations\WC_Gateway_IRefer.php:23
actioninitintegrations\WC_Gateway_IRefer.php:38
actionwp_loadedintegrations\WC_Gateway_IRefer.php:39
actioninitintegrations\WC_Gateway_IRefer.php:40
Maintenance & Trust

i-Refer Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedJan 27, 2025
PHP min version7.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

i-Refer Developer Profile

Aleksandar Romanov

1 plugin · 10 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect i-Refer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/i-refer/vendor/composer/../micropackage/requirements/src/Requirements.php/wp-content/plugins/i-refer/vendor/composer/../micropackage/requirements/src/Exception.php/wp-content/plugins/i-refer/vendor/composer/autoload_real.php/wp-content/plugins/i-refer/vendor/composer/autoload_static.php/wp-content/plugins/i-refer/vendor/composer/autoload_namespaces.php/wp-content/plugins/i-refer/vendor/composer/autoload_classmap.php+3 more

HTML / DOM Fingerprints

JS Globals
irefer_send_logirefer_get_vendor_infoirefer_deactivate_and_send_log
REST Endpoints
/wp-json/wp/v2/calc/wp-json/wp/v2/demo/example
FAQ

Frequently Asked Questions about i-Refer