Magic WP Coupons – Lite Security & Risk Analysis

wordpress.org/plugins/magic-wp-coupons

Magic WP Coupons is a WordPress based plugin which can magically turn your WordPress theme into a affiliate coupons site.

10 active installs v3.0 PHP + WP 3.0+ Updated Apr 19, 2016
couponsmake-moneymonetizationwp-coupons
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Magic WP Coupons – Lite Safe to Use in 2026?

Generally Safe

Score 85/100

Magic WP Coupons – Lite has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "magic-wp-coupons" v3.0 plugin exhibits several concerning security practices despite a clean vulnerability history. While the attack surface appears protected by authorization checks (no unprotected entry points), the code analysis reveals significant weaknesses in data handling. The plugin performs 13 SQL queries, none of which utilize prepared statements, posing a high risk of SQL injection vulnerabilities. Furthermore, only 1% of its 195 output operations are properly escaped, making it susceptible to cross-site scripting (XSS) attacks through reflected or stored data. The taint analysis indicates that all 5 analyzed flows involve unsanitized paths, and while no critical or high severity issues were flagged, this strongly suggests a lack of proper input validation and sanitization, potentially leading to unexpected behavior or exploitable flaws.

The complete absence of known CVEs is a positive sign, suggesting that either the plugin has historically been secure, or that no critical vulnerabilities have been discovered and publicly disclosed. However, the current code analysis highlights numerous areas where vulnerabilities could easily be introduced or already exist. The reliance on bundled libraries like Select2, if outdated, could also introduce vulnerabilities, though this is not explicitly stated as a risk in the provided data. Overall, while the plugin's attack surface is seemingly secured at the entry points, the internal code quality, particularly regarding SQL and output handling, presents a substantial risk that needs immediate attention.

Key Concerns

  • All SQL queries lack prepared statements
  • Extremely low percentage of properly escaped output
  • All analyzed taint flows have unsanitized paths
  • Bundled library (Select2) may be outdated
Vulnerabilities
None known

Magic WP Coupons – Lite Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Magic WP Coupons – Lite Code Analysis

Dangerous Functions
0
Raw SQL Queries
13
0 prepared
Unescaped Output
193
2 escaped
Nonce Checks
3
Capability Checks
2
File Operations
28
External Requests
1
Bundled Libraries
1

Bundled Libraries

Select2

SQL Query Safety

0% prepared13 total queries

Output Escaping

1% escaped195 total outputs
Data Flows
5 unsanitized

Data Flow Analysis

5 flows5 with unsanitized paths
dv_admin_options_page (admin\includes\dv_admin_options.php:11)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Magic WP Coupons – Lite Attack Surface

Entry Points4
Unprotected0

AJAX Handlers 4

authwp_ajax_ajax-mapsinputtitleSubmitadmin\admin-panel.php:60
noprivwp_ajax_ajax-mapsinputtitleSubmitadmin\admin-panel.php:61
authwp_ajax_ajax-installsinputtitleSubmitadmin\includes\template_installer.php:7
noprivwp_ajax_ajax-installsinputtitleSubmitadmin\includes\template_installer.php:8
WordPress Hooks 35
actionadmin_enqueue_scriptsadmin\admin-panel.php:37
actionadmin_menuadmin\admin-panel.php:51
actionadmin_enqueue_scriptsadmin\admin-panel.php:59
actionwp_insert_postadmin\cloak-manager.php:23
actioninitadmin\cloak-manager.php:54
actioninitadmin\custom_post_types_with_taxonomies.php:3
filterpost_updated_messagesadmin\custom_post_types_with_taxonomies.php:36
actioninitadmin\custom_post_types_with_taxonomies.php:82
actionstores_add_form_fieldsadmin\custom_post_types_with_taxonomies.php:121
actionstores_edit_form_fieldsadmin\custom_post_types_with_taxonomies.php:122
actioncreated_storesadmin\custom_post_types_with_taxonomies.php:212
actionedited_storesadmin\custom_post_types_with_taxonomies.php:213
actionadmin_enqueue_scriptsadmin\includes\dv_admin_options.php:9
actionadmin_enqueue_scriptsadmin\includes\template_installer.php:6
actionadmin_menuadmin\meta_box.php:48
actionsave_postadmin\meta_box.php:99
actioninitadmin\term_meta_class.php:5
actionswitch_blogadmin\term_meta_class.php:6
actionwpmu_new_blogadmin\term_meta_class.php:7
actionwidgets_initadmin\widgets\coupon_stores.php:2
actionwidgets_initadmin\widgets\latest_coupons.php:2
actionwidgets_initadmin\widgets\popular_coupons.php:2
actionadmin_headeditors_button\index.php:3
actioniniteditors_button\index.php:32
filtermce_external_pluginseditors_button\index.php:34
filtermce_buttonseditors_button\index.php:35
actionwp_headindex.php:80
actioninitindex.php:109
actionwp_headindex.php:132
actioninitindex.php:152
actionadded_post_metaindex.php:218
actionupdated_post_metaindex.php:219
actioninitindex.php:262
actionswitch_blogindex.php:263
actionwpmu_new_blogindex.php:264
Maintenance & Trust

Magic WP Coupons – Lite Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedApr 19, 2016
PHP min version
Downloads24K

Community Trust

Rating88/100
Number of ratings19
Active installs10
Developer Profile

Magic WP Coupons – Lite Developer Profile

shahzad11

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Magic WP Coupons – Lite

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/magic-wp-coupons/css/admin_style.css/wp-content/plugins/magic-wp-coupons/js/script.js
Script Paths
/wp-content/plugins/magic-wp-coupons/js/jquery.zclip.js/wp-content/plugins/magic-wp-coupons/templates/custom.js/wp-content/plugins/magic-wp-coupons/js/dv_coupons.js
Version Parameters
magic-wp-coupons/templates/magic-wp-coupons/js/script.js?ver=magic-wp-coupons/css/admin_style.css?ver=magic-wp-coupons/js/jquery.zclip.js?ver=magic-wp-coupons/templates/magic-wp-coupons/js/dv_coupons.js?ver=

HTML / DOM Fingerprints

CSS Classes
blog_sidebar_widget_titlelikedislikecoupon_views
HTML Comments
<!-- DV Report Class | For reporting of coupons --><!-- For fetching coupons with cron --><!-- Templating single/archive coupon pages --><!-- Templating single/archive coupon pages -->+8 more
Data Attributes
dv_coupon_template
JS Globals
PLUGIN_NAMEPLUGIN_POST_TYPEPLUGIN_URLPLUGIN_BASEPLUGIN_DIRPLUGIN_JS_DIR+8 more
FAQ

Frequently Asked Questions about Magic WP Coupons – Lite