Invoices by Customer Security & Risk Analysis

wordpress.org/plugins/invoices-by-customer-347

Obtain a list of invoices by quarter and year for customers who exceed a certain amount.

20 active installs v1.0.3 PHP 7.3.16+ WP 4.6+ Updated Aug 10, 2023
billinginvoice-listingspurchases-by-customerwoocommerce-listings
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Invoices by Customer Safe to Use in 2026?

Generally Safe

Score 85/100

Invoices by Customer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The plugin 'invoices-by-customer-347' v1.0.3 exhibits a mixed security posture. On the positive side, it has a zero attack surface exposed via AJAX, REST API, shortcodes, or cron events. The code also shows strong adherence to output escaping practices, with 98% of outputs properly escaped, and no dangerous functions, file operations, or external HTTP requests were detected. The absence of any recorded vulnerabilities in its history is also a significant positive indicator.

However, there are notable concerns stemming from the static analysis. The taint analysis revealed two flows with unsanitized paths, both flagged as high severity. This indicates a potential for sensitive data to be mishandled or exposed if these paths are exploited. Furthermore, while the plugin uses prepared statements for 33% of its SQL queries, 67% do not, posing a risk of SQL injection vulnerabilities. The complete absence of nonce checks and capability checks across all entry points (though limited) is also a weakness that could be exploited if entry points were to be introduced or discovered.

In conclusion, while the plugin demonstrates good practices in output escaping and has a clean vulnerability history, the presence of high-severity taint flows and the significant proportion of SQL queries not using prepared statements present tangible risks. The lack of robust authentication checks on potential (even if currently zero) entry points is also a concern. Addressing the taint flows and securing the SQL queries should be the immediate priorities.

Key Concerns

  • High severity taint flows found
  • SQL queries not using prepared statements (67%)
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Invoices by Customer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Invoices by Customer Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
2 prepared
Unescaped Output
2
80 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

33% prepared6 total queries

Output Escaping

98% escaped82 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
mci_347_lista_clientes (index.php:91)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Invoices by Customer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_enqueue_scriptsindex.php:17
actionadmin_menuindex.php:74
Maintenance & Trust

Invoices by Customer Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedAug 10, 2023
PHP min version7.3.16
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Invoices by Customer Developer Profile

MCI Desarrollo

4 plugins · 500 total installs

90
trust score
Avg Security Score
94/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Invoices by Customer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/invoices-by-customer-347/style-347.css
Version Parameters
invoices-by-customer-347/style-347.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Invoices by Customer