Mercantor Security & Risk Analysis

wordpress.org/plugins/mercantor

Seamlessly sync your WooCommerce products to Google Merchant Center with real-time updates, multilingual support, and automatic error handling.

0 active installs v1.2.0 PHP 8.1+ WP 6.5+ Updated Feb 7, 2026
google-adsgoogle-shoppingmerchant-centerproduct-feedwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mercantor Safe to Use in 2026?

Generally Safe

Score 100/100

Mercantor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The 'mercantor' plugin v1.2.0 presents a mixed security posture. While it demonstrates strong practices in code sanitation, with a very high percentage of SQL queries using prepared statements and a near-perfect rate of output escaping, significant concerns arise from its attack surface. All 13 identified REST API routes lack permission callbacks, meaning they are accessible and potentially executable by any user, regardless of their role or logged-in status. This creates a substantial risk of unauthorized actions or data exposure through these unprotected endpoints.

The absence of known vulnerabilities in its history is a positive indicator, suggesting that developers may be proactive or that the plugin has not been a target. However, this cannot overshadow the immediate risks posed by the exposed REST API. The plugin also has a single cron event, which, while not explicitly stated as unprotected, warrants scrutiny to ensure it doesn't become an additional attack vector if not properly secured. The presence of nonce checks and capability checks, though limited in number, suggests an awareness of security principles, but their implementation is not comprehensive enough to mitigate the risks of the open REST API.

In conclusion, 'mercantor' v1.2.0 exhibits excellent code hygiene regarding SQL and output handling. However, the plugin's security is severely compromised by a large, unprotected attack surface primarily consisting of REST API endpoints. The lack of authentication and authorization on these points is the most critical finding and represents a significant security weakness that attackers could exploit. Despite a clean vulnerability history, the inherent design flaw in exposing these endpoints makes the plugin a high-risk component until these are properly secured.

Key Concerns

  • REST API routes without permission callbacks
  • Total entry points without protection
  • Limited nonce checks
  • Limited capability checks
Vulnerabilities
None known

Mercantor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Mercantor Release Timeline

v1.2.0Current
v1.1.0
Code Analysis
Analyzed Mar 17, 2026

Mercantor Code Analysis

Dangerous Functions
0
Raw SQL Queries
19
69 prepared
Unescaped Output
1
28 escaped
Nonce Checks
1
Capability Checks
9
File Operations
4
External Requests
4
Bundled Libraries
0

SQL Query Safety

78% prepared88 total queries

Output Escaping

97% escaped29 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
render_oauth_callback (src\Plugin.php:214)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
13 unprotected

Mercantor Attack Surface

Entry Points13
Unprotected13

REST API Routes 13

GET/wp-json/mercantor/v1/identifiers/statssrc\API\Controllers\IdentifierController.php:45
GET/wp-json/mercantor/v1/identifiers/missingsrc\API\Controllers\IdentifierController.php:58
GET/wp-json/mercantor/v1/identifiers/product/(?P<id>\d+)src\API\Controllers\IdentifierController.php:89
GET/wp-json/mercantor/v1/identifiers/product/(?P<id>\d+)src\API\Controllers\IdentifierController.php:102
GET/wp-json/mercantor/v1/identifiers/importsrc\API\Controllers\IdentifierController.php:126
GET/wp-json/mercantor/v1/identifiers/exportsrc\API\Controllers\IdentifierController.php:158
GET/wp-json/mercantor/v1/identifiers/templatesrc\API\Controllers\IdentifierController.php:177
GET/wp-json/mercantor/v1/identifiers/validate-gtinsrc\API\Controllers\IdentifierController.php:190
GET/wp-json/mercantor/v1/schedulesrc\API\Controllers\ScheduleController.php:47
GET/wp-json/mercantor/v1/schedule/syncsrc\API\Controllers\ScheduleController.php:59
GET/wp-json/mercantor/v1/schedule/diagnosticssrc\API\Controllers\ScheduleController.php:78
GET/wp-json/mercantor/v1/schedule/run-nowsrc\API\Controllers\ScheduleController.php:97
GET/wp-json/mercantor/v1/schedule/optionssrc\API\Controllers\ScheduleController.php:109
WordPress Hooks 18
actionadmin_noticesmercantor.php:165
actionadmin_noticesmercantor.php:170
actionplugins_loadedmercantor.php:179
filteraction_scheduler_queue_runner_batch_sizesrc\CLI\MercantorCommand.php:442
filteraction_scheduler_queue_runner_time_limitsrc\CLI\MercantorCommand.php:445
actionadmin_menusrc\Plugin.php:72
actionadmin_enqueue_scriptssrc\Plugin.php:73
actionadmin_noticessrc\Plugin.php:74
actionrest_api_initsrc\Plugin.php:79
filteraction_scheduler_queue_runner_concurrent_batchessrc\Plugin.php:82
filteraction_scheduler_queue_runner_batch_sizesrc\Plugin.php:87
filteraction_scheduler_queue_runner_time_limitsrc\Plugin.php:92
actionupdate_option_mercantor_sync_schedulesrc\Scheduling\SyncScheduler.php:72
actionupdate_option_mercantor_diagnostics_schedulesrc\Scheduling\SyncScheduler.php:73
actioninitsrc\Scheduling\SyncScheduler.php:76
actionwoocommerce_update_productsrc\Sync\SyncOrchestrator.php:86
actionwoocommerce_new_productsrc\Sync\SyncOrchestrator.php:87
actionbefore_delete_postsrc\Sync\SyncOrchestrator.php:90

Scheduled Events 1

mercantor_sync_check
Maintenance & Trust

Mercantor Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 7, 2026
PHP min version8.1
Downloads297

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Mercantor Developer Profile

JaJaSolutions

2 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mercantor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mercantor/assets/css/mercantor.css/wp-content/plugins/mercantor/assets/js/mercantor.js
Script Paths
/wp-content/plugins/mercantor/assets/js/mercantor.js
Version Parameters
mercantor/assets/css/mercantor.css?ver=mercantor/assets/js/mercantor.js?ver=

HTML / DOM Fingerprints

CSS Classes
mercantor-setup-notice
Data Attributes
data-mercantor-product-iddata-mercantor-sync-status
JS Globals
Mercantor
REST Endpoints
/wp-json/mercantor/v1/sync/wp-json/mercantor/v1/products/wp-json/mercantor/v1/settings
FAQ

Frequently Asked Questions about Mercantor