JwelAR Security & Risk Analysis

wordpress.org/plugins/jwelar

Enable AR-based jewelry try-on with Tigervue. Upload 3D GLB files, integrate APIs, and manage onboarding in one place.

0 active installs v1.0.0 PHP 7.4+ WP 5.0+ Updated Jun 28, 2025
arjewelrytry-onvirtul-try-onwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is JwelAR Safe to Use in 2026?

Generally Safe

Score 100/100

JwelAR has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9mo ago
Risk Assessment

The jwelar v1.0.0 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices in output escaping, with all observed outputs being properly handled, and it avoids dangerous functions, file operations, and external HTTP requests. Furthermore, its vulnerability history is clean, with no recorded CVEs, suggesting a lack of previously exploited weaknesses. However, significant concerns arise from its attack surface. The presence of a REST API route without permission callbacks creates a direct, unprotected entry point, which is a critical security flaw. Additionally, the static analysis reveals raw SQL queries are being used without prepared statements, indicating a potential for SQL injection vulnerabilities. The absence of nonce checks on AJAX handlers further compounds the risk of CSRF attacks. The bundled Freemius library, while common, could be a point of concern if it's an outdated version and has known vulnerabilities, although this is not explicitly stated in the provided data. Overall, the plugin has strengths in output handling and a clean history but is weakened by unprotected entry points and raw SQL usage.

Key Concerns

  • REST API route without permission callbacks
  • Raw SQL queries without prepared statements
  • No nonce checks on AJAX handlers
  • Bundled Freemius v1.0 library
Vulnerabilities
None known

JwelAR Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

JwelAR Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
0
15 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Freemius1.0

SQL Query Safety

0% prepared1 total queries

Output Escaping

100% escaped15 total outputs
Attack Surface
1 unprotected

JwelAR Attack Surface

Entry Points2
Unprotected1

REST API Routes 2

GET/wp-json/jwelar/v1/productsapi.php:5
POST/wp-json/jwelar/v1/addapi.php:11
WordPress Hooks 6
actionrest_api_initapi.php:4
actionadmin_menujwelar.php:50
actionadmin_enqueue_scriptsjwelar.php:55
actionwoocommerce_product_options_general_product_datajwelar.php:176
actionwoocommerce_admin_process_product_objectjwelar.php:187
actionwoocommerce_single_product_summaryjwelar.php:194
Maintenance & Trust

JwelAR Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJun 28, 2025
PHP min version7.4
Downloads366

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

JwelAR Developer Profile

TigerVue

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect JwelAR

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/jwelar/style/style.css

HTML / DOM Fingerprints

CSS Classes
nav-tabsactivetab-contentcardscardbtn
Data Attributes
data-freemius-id="19601"
FAQ

Frequently Asked Questions about JwelAR