ingenidev Buy One Get One Free (BOGO) for WooCommerce Security & Risk Analysis

wordpress.org/plugins/ingenidev-bogo-offers-for-woocommerce

NEW Plugin! The ultimate WooCommerce plugin for creating powerful Buy One Get One Free (BOGO) deals, dynamic pricing rules, quantity discounts to boos …

10 active installs v1.0.0 PHP 7.4+ WP 5.0+ Updated Feb 9, 2026
bogobuy-one-get-one-freediscountsdynamic-pricingwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ingenidev Buy One Get One Free (BOGO) for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

ingenidev Buy One Get One Free (BOGO) for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The "ingenidev-bogo-offers-for-woocommerce" plugin v1.0.0 demonstrates a generally good security posture based on the provided static analysis. There are no identified dangerous functions, no direct SQL queries (all use prepared statements), no file operations, and no external HTTP requests. The plugin also includes nonce and capability checks, indicating an effort to implement basic access control. The limited attack surface, with zero identified entry points like AJAX handlers, REST API routes, or shortcodes, further contributes to its perceived security.

However, a notable concern is the output escaping, where only 67% of outputs are properly escaped. This leaves a significant portion of the plugin's output potentially vulnerable to Cross-Site Scripting (XSS) attacks if user-supplied data is not sufficiently sanitized before being displayed. The lack of any recorded vulnerability history is positive, suggesting the developers have either maintained good security practices or the plugin has not been extensively tested or targeted. Despite the absence of critical taint flows or dangerous code signals, the incomplete output escaping presents a clear risk that warrants attention.

In conclusion, while the plugin avoids many common security pitfalls and has a minimal attack surface, the insufficient output escaping is a tangible weakness. This deficiency could be exploited to inject malicious scripts, impacting user sessions or site integrity. The plugin's strengths lie in its controlled entry points and secure data handling for queries, but the output escaping needs improvement to achieve a robust security profile.

Key Concerns

  • Insufficient output escaping
Vulnerabilities
None known

ingenidev Buy One Get One Free (BOGO) for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

ingenidev Buy One Get One Free (BOGO) for WooCommerce Release Timeline

v1.0.0Current
Code Analysis
Analyzed Mar 17, 2026

ingenidev Buy One Get One Free (BOGO) for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
44
91 escaped
Nonce Checks
2
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped135 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

1 flows
<ing-bogo-functions> (ing-bogo-functions.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

ingenidev Buy One Get One Free (BOGO) for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
actionwp_enqueue_scriptsing-bogo-functions.php:14
actionwoocommerce_add_cart_item_dataing-bogo-functions.php:44
actionwoocommerce_add_to_carting-bogo-functions.php:153
actionwoocommerce_after_cart_item_quantity_updateing-bogo-functions.php:204
actionwoocommerce_before_calculate_totalsing-bogo-functions.php:298
filterwoocommerce_get_item_dataing-bogo-functions.php:386
actionwoocommerce_before_add_to_cart_buttoning-bogo-functions.php:414
actionwoocommerce_after_shop_loop_item_titleing-bogo-functions.php:449
actionwp_footering-bogo-functions.php:457
actionadd_meta_boxesing-bogo-functions.php:476
actionsave_posting-bogo-functions.php:524
actionwoocommerce_product_after_variable_attributesing-bogo-functions.php:550
actionwoocommerce_save_product_variationing-bogo-functions.php:594
actionbefore_woocommerce_initing-bogo.php:35
actionadmin_menuing-bogo.php:66
actionadmin_enqueue_scriptsing-bogo.php:69
Maintenance & Trust

ingenidev Buy One Get One Free (BOGO) for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 9, 2026
PHP min version7.4
Downloads232

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

ingenidev Buy One Get One Free (BOGO) for WooCommerce Developer Profile

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ingenidev Buy One Get One Free (BOGO) for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ingenidev-bogo-offers-for-woocommerce/assets/css/ing-bogo-admin.css
Version Parameters
ingenidev-bogo-offers-for-woocommerce/assets/css/ing-bogo-admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
ingenidev-bogo-offers-for-woocommerce
Data Attributes
data-product-iddata-variation-id
FAQ

Frequently Asked Questions about ingenidev Buy One Get One Free (BOGO) for WooCommerce