Miguel for WooCommerce Security & Risk Analysis

wordpress.org/plugins/miguel

Sell watermarked e-books and audiobooks directly from your WooCommerce e-shop.

10 active installs v1.5.0 PHP 7.2+ WP 4.9+ Updated Jan 10, 2026
audiobooksebookssocial-drmwatermarkedwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Miguel for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

Miguel for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The 'miguel' plugin v1.5.0 exhibits a very strong security posture based on the static analysis results and vulnerability history. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface, and importantly, all identified entry points are protected. The code demonstrates excellent adherence to secure coding practices, with no dangerous functions used, all SQL queries employing prepared statements, and all output being properly escaped. Furthermore, the plugin avoids file operations and does not make external HTTP requests in a way that appears to introduce risk. The vulnerability history is also pristine, with no known CVEs, indicating a history of secure development or timely patching. The only minor points of consideration are the two external HTTP requests, which, while not flagged as risky in this analysis, always warrant a second look in a deeper audit to ensure they are being made securely. Overall, this plugin appears to be exceptionally well-secured.

Vulnerabilities
None known

Miguel for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Miguel for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

100% escaped9 total outputs
Attack Surface

Miguel for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
filterwoocommerce_get_settings_pagesincludes\admin\class-miguel-admin.php:41
filterwoocommerce_settings_tabs_arrayincludes\admin\class-miguel-settings.php:39
actionwoocommerce_download_productincludes\class-miguel-download.php:81
actionwoocommerce_order_status_changedincludes\class-miguel-orders.php:48
actionwoocommerce_update_orderincludes\class-miguel-orders.php:49
actioninitincludes\class-miguel.php:131
filterplugin_action_links_miguel/miguel.phpincludes\class-miguel.php:134
actionbefore_woocommerce_initincludes\class-miguel.php:137
Maintenance & Trust

Miguel for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJan 10, 2026
PHP min version7.2
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Miguel for WooCommerce Developer Profile

Servantes

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Miguel for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/miguel/assets/css/miguel.css/wp-content/plugins/miguel/assets/js/miguel.js
Script Paths
/wp-content/plugins/miguel/assets/js/miguel.js
Version Parameters
miguel/assets/css/miguel.css?ver=miguel/assets/js/miguel.js?ver=

HTML / DOM Fingerprints

CSS Classes
miguel-ebook-download
Data Attributes
data-miguel-order-iddata-miguel-product-iddata-miguel-download-urldata-miguel-nonce
JS Globals
miguel_ajax_object
Shortcode Output
[miguel_ebook_download_button]
FAQ

Frequently Asked Questions about Miguel for WooCommerce