Luway WooCommerce Upsale Security & Risk Analysis

wordpress.org/plugins/luway-upsale

Create upsell block based on orders history.

0 active installs v1.1.0 PHP 5.6+ WP + Updated Nov 15, 2021
increase-salesupsaleupsellwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Luway WooCommerce Upsale Safe to Use in 2026?

Generally Safe

Score 85/100

Luway WooCommerce Upsale has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "luway-upsale" v1.1.0 plugin exhibits a generally positive security posture based on the provided static analysis. The lack of any known vulnerabilities in its history is a strong indicator of responsible development practices. Furthermore, all identified outputs are properly escaped, and there are no indications of file operations, external HTTP requests, or bundled libraries, which often serve as common attack vectors. The plugin also appears to have a limited attack surface with no unprotected entry points detected.

However, the analysis does reveal some areas for concern. The presence of SQL queries that are not using prepared statements is a significant risk, as this can lead to SQL injection vulnerabilities if user input is not meticulously sanitized before being incorporated into these queries. Additionally, the absence of nonce checks and capability checks on any potential entry points, while currently appearing to have no unprotected handlers or routes, leaves the plugin susceptible to cross-site request forgery (CSRF) attacks and privilege escalation if new entry points are introduced or existing ones are mishandled in future updates.

In conclusion, while "luway-upsale" v1.1.0 benefits from a clean vulnerability history and good output escaping, the un-prepared SQL queries and lack of authorization checks represent tangible security risks. Addressing these specific code-level concerns would significantly bolster the plugin's security.

Key Concerns

  • SQL queries not using prepared statements
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Luway WooCommerce Upsale Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Luway WooCommerce Upsale Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Luway WooCommerce Upsale Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries

Output Escaping

100% escaped1 total outputs
Attack Surface

Luway WooCommerce Upsale Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wcupsale] luway-upsale.php:22
WordPress Hooks 1
actioninitluway-upsale.php:23
Maintenance & Trust

Luway WooCommerce Upsale Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedNov 15, 2021
PHP min version5.6
Downloads760

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Luway WooCommerce Upsale Developer Profile

Alex

2 plugins · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Luway WooCommerce Upsale

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/luway-upsale/build/index.js/wp-content/plugins/luway-upsale/build/style-index.css
Script Paths
/wp-content/plugins/luway-upsale/build/index.js
Version Parameters
luway-upsale/build/index.js?ver=luway-upsale/build/style-index.css?ver=

HTML / DOM Fingerprints

Shortcode Output
[products columns="
FAQ

Frequently Asked Questions about Luway WooCommerce Upsale