MegaSend for WooCommerce Security & Risk Analysis

wordpress.org/plugins/megasend-for-woocommerce

Recover abandoned carts and boost sales with automated WhatsApp messages powered by MegaSend.

0 active installs v1.0.2 PHP 8.1+ WP 6.2+ Updated Mar 13, 2026
abandoned-cartcart-recoveryorder-notificationswhatsappwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is MegaSend for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

MegaSend for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 21d ago
Risk Assessment

The "megasend-for-woocommerce" plugin version 1.0.2 exhibits a generally good security posture, with several strong practices in place. The complete absence of raw SQL queries, 100% output escaping, and a single nonce and capability check on its two AJAX entry points are commendable. Furthermore, the plugin has no recorded vulnerability history, which suggests a history of responsible development or diligent patching by users if past issues existed.

However, the analysis does reveal some areas of concern. The taint analysis identified three "flows with unsanitized paths" with a high severity. While the static analysis didn't immediately map these to exploitable vulnerabilities, this is a significant red flag. It implies that user-supplied data might be processed in a way that could lead to security issues, particularly if these paths are accessible without proper validation or sanitization, even if they don't immediately manifest as SQL injection or XSS. The two external HTTP requests also warrant careful review to ensure they are not susceptible to SSRF or other network-related vulnerabilities.

In conclusion, while the plugin benefits from a clean vulnerability history and good core security practices like prepared statements and output escaping, the high-severity unsanitized taint flows represent a notable risk. Addressing these potential pathways for unsanitized data is crucial for a truly robust security profile. The overall risk is moderate, leaning towards good, but with a clear need for investigation into the identified taint flows.

Key Concerns

  • High severity unsanitized taint flows
Vulnerabilities
None known

MegaSend for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

MegaSend for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
112 prepared
Unescaped Output
0
88 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
2
Bundled Libraries
0

SQL Query Safety

98% prepared114 total queries

Output Escaping

100% escaped88 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

5 flows3 with unsanitized paths
handle_track_checkout (includes\tracking\class-cart-tracker.php:89)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

MegaSend for WooCommerce Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_megasend_woo_track_checkoutincludes\tracking\class-cart-tracker.php:32
noprivwp_ajax_megasend_woo_track_checkoutincludes\tracking\class-cart-tracker.php:33
WordPress Hooks 24
actionwoocommerce_new_orderincludes\abandonment\class-recovery-tracker.php:28
actionwoocommerce_payment_completeincludes\abandonment\class-recovery-tracker.php:31
actionmegasend_woo_follow_up_stepincludes\abandonment\class-sequence-runner.php:32
actionadmin_enqueue_scriptsincludes\admin\class-admin-assets.php:25
actionadmin_menuincludes\admin\class-admin-menu.php:23
actionadmin_initincludes\admin\class-admin-menu.php:24
actionrest_api_initincludes\class-plugin.php:105
actionmegasend_woo_check_abandoned_cartsincludes\class-plugin.php:119
actioninitincludes\class-plugin.php:125
actionwoocommerce_new_orderincludes\events\class-event-dispatcher.php:39
actionwoocommerce_payment_completeincludes\events\class-event-dispatcher.php:42
actionwoocommerce_order_status_processingincludes\events\class-event-dispatcher.php:48
actionwoocommerce_order_status_completedincludes\events\class-event-dispatcher.php:51
actionwoocommerce_order_status_cancelledincludes\events\class-event-dispatcher.php:52
actionwoocommerce_order_refundedincludes\events\class-event-dispatcher.php:55
actionmegasend_woo_send_order_messageincludes\events\class-event-dispatcher.php:308
actionwoocommerce_after_checkout_formincludes\tracking\class-cart-tracker.php:26
actionwoocommerce_blocks_loadedincludes\tracking\class-cart-tracker.php:29
actiontemplate_redirectincludes\tracking\class-cart-tracker.php:36
actionwoocommerce_review_order_before_submitincludes\tracking\class-cart-tracker.php:40
actionwoocommerce_blocks_enqueue_checkout_block_scripts_afterincludes\tracking\class-cart-tracker.php:48
actionadmin_noticesmegasend-woo.php:68
actionbefore_woocommerce_initmegasend-woo.php:85
actionplugins_loadedmegasend-woo.php:120
Maintenance & Trust

MegaSend for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 13, 2026
PHP min version8.1
Downloads249

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

MegaSend for WooCommerce Developer Profile

weblixtech

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MegaSend for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/megasend-for-woocommerce/admin/build/index.js/wp-content/plugins/megasend-for-woocommerce/admin/build/index.css
Version Parameters
megasend-woo-adminmegasend-for-woocommerce

HTML / DOM Fingerprints

JS Globals
megasendWoo
REST Endpoints
/wp-json/megasend-woo/v1
FAQ

Frequently Asked Questions about MegaSend for WooCommerce