MZR Buy X Pay Y Security & Risk Analysis

wordpress.org/plugins/mzr-buy-x-pay-y

Powerful "Buy X Pay Y" discount module for WooCommerce. Create dynamic promotions like "Buy 2 Pay 1", "Buy 3 Pay 2", and more!

50 active installs v1.0.1 PHP 7.0+ WP 5.6+ Updated May 15, 2025
buy-x-get-ycart-discountdiscountdynamic-pricingwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is MZR Buy X Pay Y Safe to Use in 2026?

Generally Safe

Score 100/100

MZR Buy X Pay Y has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10mo ago
Risk Assessment

The "mzr-buy-x-pay-y" v1.0.1 plugin exhibits a strong static security posture with no identified dangerous functions, file operations, or external HTTP requests. The absence of SQL queries not using prepared statements and a high rate of properly escaped output are positive indicators. Furthermore, the plugin has no recorded vulnerabilities, CVEs, or a history of past security issues, suggesting a commitment to secure coding practices. The attack surface is currently reported as zero, with no AJAX handlers, REST API routes, shortcodes, or cron events, which significantly limits potential entry points for attackers.

While the static analysis and vulnerability history are reassuring, the complete absence of nonces and capability checks on potential entry points is a significant concern. Even with zero currently identified entry points, any future additions or changes to the plugin that introduce such points without these crucial security mechanisms could create immediate vulnerabilities. The lack of taint analysis results also makes it difficult to definitively rule out potential risks in data handling. Overall, the plugin appears well-developed from a security perspective based on the current analysis, but the lack of authentication and authorization checks on any potential (even if currently non-existent) entry points is a notable weakness that warrants attention for future development.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

MZR Buy X Pay Y Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

MZR Buy X Pay Y Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

80% escaped5 total outputs
Attack Surface

MZR Buy X Pay Y Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionplugins_loadedmzr-buy-x-pay-y.php:18
actionadmin_noticesmzr-buy-x-pay-y.php:21
filterwoocommerce_get_sections_generalmzr-buy-x-pay-y.php:27
filterwoocommerce_get_settings_generalmzr-buy-x-pay-y.php:28
actionwoocommerce_cart_calculate_feesmzr-buy-x-pay-y.php:29
actionwoocommerce_cart_totals_after_order_totalmzr-buy-x-pay-y.php:30
actionwoocommerce_review_order_after_order_totalmzr-buy-x-pay-y.php:31
Maintenance & Trust

MZR Buy X Pay Y Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedMay 15, 2025
PHP min version7.0
Downloads607

Community Trust

Rating100/100
Number of ratings2
Active installs50
Developer Profile

MZR Buy X Pay Y Developer Profile

Meshut Digital

2 plugins · 50 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MZR Buy X Pay Y

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mzr-buy-x-pay-y/assets/css/frontend.css/wp-content/plugins/mzr-buy-x-pay-y/assets/js/frontend.js
Script Paths
/wp-content/plugins/mzr-buy-x-pay-y/assets/js/frontend.js
Version Parameters
mzr-buy-x-pay-y/assets/css/frontend.css?ver=mzr-buy-x-pay-y/assets/js/frontend.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-min
FAQ

Frequently Asked Questions about MZR Buy X Pay Y