Import WooCommerce Suite Security & Risk Analysis

wordpress.org/plugins/import-woocommerce

Use the WooCommerce Import Suite to import Products, Orders, Coupons, Customers, and Reviews with ease. Requires the WP Ultimate CSV Importer Free plu …

4K active installs v2.8 PHP 7.4+ WP 5.0+ Updated Dec 17, 2025
export-woocommerce-productsimportproduct-exportwoocommerce-csv-importwoocommerce-xml-import
100
A · Safe
CVEs total1
Unpatched0
Last CVEFeb 24, 2016
Download
Safety Verdict

Is Import WooCommerce Suite Safe to Use in 2026?

Generally Safe

Score 100/100

Import WooCommerce Suite has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Feb 24, 2016Updated 5mo ago
Risk Assessment

The 'import-woocommerce' plugin version 2.8 exhibits a mixed security posture. While it shows strong adherence to output escaping and a good percentage of SQL queries using prepared statements, there are notable concerns. The presence of one unprotected AJAX handler significantly expands the attack surface, making it a potential entry point for unauthorized actions if not properly secured by other means. The use of the `unserialize` function is a critical risk, as it can lead to Remote Code Execution vulnerabilities if untrusted data is processed. While the plugin has a history of vulnerabilities, including a medium severity one in 2016 related to Cross-Site Scripting, the fact that there are currently no unpatched CVEs is a positive indicator. However, the absence of capability checks in the code analysis is concerning and suggests a potential reliance on other layers of security which might not always be sufficient.

Overall, the plugin has areas of strength, particularly in its output handling. However, the unprotected AJAX handler and the use of `unserialize` present immediate and significant risks that require careful attention. The past vulnerability history, though resolved, underscores the need for continued vigilance and robust security practices. A balanced conclusion would be that while some security fundamentals are in place, critical vulnerabilities are present in the analyzed code, and the lack of explicit capability checks warrants further investigation into the plugin's overall security architecture.

Key Concerns

  • Unprotected AJAX handler found
  • Dangerous function 'unserialize' found
  • No capability checks found
  • Medium severity CVE in history
Vulnerabilities
1 published

Import WooCommerce Suite Security Vulnerabilities

CVEs by Year

1 CVE in 2016
2016
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

WF-64a7a4db-8b28-4085-91b0-4ea5343c5643-import-woocommercemedium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Import WooCommerce < 1.1 - Reflected Cross-Site Scripting

Feb 24, 2016 Patched in 1.1 (2890d)
Version History

Import WooCommerce Suite Release Timeline

v2.8Current
v2.7
v2.6.1
v2.6
v2.5
v2.4
v2.3
v2.2
v2.1
v2.0
v1.9.4
v1.9.3
v1.9.2
v1.9.1
v1.9
v1.8
v1.7
v1.6.9
v1.6.8
v1.6.7
Code Analysis
Analyzed Mar 16, 2026

Import WooCommerce Suite Code Analysis

Dangerous Functions
6
Raw SQL Queries
66
46 prepared
Unescaped Output
3
33 escaped
Nonce Checks
2
Capability Checks
0
File Operations
8
External Requests
2
Bundled Libraries
0

Dangerous Functions Found

unserialize$stored_ids = unserialize(get_option('total_attachment_ids', ''));importExtensions\MediaHandling.php:500
unserialize$get_stored_ids = unserialize(get_option('total_attachment_ids', ''));importExtensions\MediaHandling.php:502
unserialize$stored_ids = unserialize(get_option('total_attachment_ids', ''));importExtensions\MediaHandling.php:510
unserialize$stored_ids = unserialize(get_option('failed_attachment_ids', ''));importExtensions\MediaHandling.php:519
unserialize$get_stored_ids = unserialize(get_option('failed_attachment_ids', ''));importExtensions\MediaHandling.php:521
unserialize$stored_ids = unserialize(get_option('failed_attachment_ids', ''));importExtensions\MediaHandling.php:529

SQL Query Safety

41% prepared112 total queries

Output Escaping

92% escaped36 total outputs
Attack Surface
1 unprotected

Import WooCommerce Suite Attack Surface

Entry Points3
Unprotected1

AJAX Handlers 3

authwp_ajax_DeactivateMailwoocommerceimport-woocommerce.php:59
authwp_ajax_image_optionsimportExtensions\MediaHandling.php:21
authwp_ajax_delete_imageimportExtensions\MediaHandling.php:22
WordPress Hooks 7
actionadmin_noticesimport-woocommerce.php:80
actionpopup_woocommerceimport-woocommerce.php:81
filterwp_mail_content_typeimport-woocommerce.php:100
actionplugins_loadedimport-woocommerce.php:163
actionadmin_initSmackInstallImportWoocommerce.php:52
actionadmin_initSmackInstallImportWoocommerce.php:53
filterplugin_row_metaSmackInstallImportWoocommerce.php:55
Maintenance & Trust

Import WooCommerce Suite Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 17, 2025
PHP min version7.4
Downloads169K

Community Trust

Rating46/100
Number of ratings6
Active installs4K
Developer Profile

Import WooCommerce Suite Developer Profile

Smackcoders Inc.,

23 plugins · 40K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
946 days
View full developer profile
Detection Fingerprints

How We Detect Import WooCommerce Suite

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/import-woocommerce/smack-huginn.css/wp-content/plugins/import-woocommerce/smack-huginn.js/wp-content/plugins/import-woocommerce/js/smack-huginn-script.js/wp-content/plugins/import-woocommerce/css/smack-huginn-style.css
Script Paths
/wp-content/plugins/import-woocommerce/js/smack-huginn-script.js/wp-content/plugins/import-woocommerce/css/smack-huginn-style.css

HTML / DOM Fingerprints

CSS Classes
smack-huginn-csssmack-huginn-js
JS Globals
window.smack_huginn
FAQ

Frequently Asked Questions about Import WooCommerce Suite