Ni Purchase Order(PO) For WooCommerce Security & Risk Analysis

wordpress.org/plugins/ni-purchase-orderpo-for-woocommerce

Ni Purchase Order (PO) For WooCommerce gives you the option to create the product purchase order for product vendor or supplier.   

10 active installs v1.2.3 PHP 7.0+ WP 4.7+ Updated May 31, 2024
orderpurchase-orderpurchase-pdfvendorwoocommerce
92
A · Safe
CVEs total1
Unpatched0
Last CVESep 26, 2023
Safety Verdict

Is Ni Purchase Order(PO) For WooCommerce Safe to Use in 2026?

Generally Safe

Score 92/100

Ni Purchase Order(PO) For WooCommerce has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Sep 26, 2023Updated 1yr ago
Risk Assessment

The "ni-purchase-orderpo-for-woocommerce" plugin version 1.2.3 exhibits several security concerns that warrant attention. While the plugin does utilize prepared statements for a majority of its SQL queries and has a history of only low-severity vulnerabilities, the static analysis reveals significant weaknesses. The presence of an unprotected AJAX handler represents a critical entry point that could be exploited by unauthenticated users, leading to potential unauthorized actions or data manipulation.

Furthermore, the low percentage of properly escaped output (43%) suggests a risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data might be rendered directly in the browser without proper sanitization. The lack of nonce and capability checks on its single entry point is a major concern, directly contributing to the unprotected attack surface. While no critical or high-severity taint flows were detected, the combination of unprotected entry points and insufficient output escaping presents a notable security risk.

The plugin's vulnerability history shows a single low-severity "Unrestricted Upload of File with Dangerous Type" vulnerability in late 2023, which is now patched. This indicates that while the developers have addressed past issues, the current version still carries inherent risks due to its static analysis findings. The overall security posture is mixed, with some good practices in SQL handling but significant gaps in input validation and authorization for its AJAX endpoint.

Key Concerns

  • Unprotected AJAX handler (1 without auth checks)
  • Low percentage of properly escaped output (43%)
  • No nonce checks on entry points
  • No capability checks on entry points
  • Bundled outdated library: dompdf
Vulnerabilities
1 published

Ni Purchase Order(PO) For WooCommerce Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

Low
1

1 total CVE

CVE-2023-5957low · 3.8Unrestricted Upload of File with Dangerous Type

Ni Purchase Order(PO) For WooCommerce <= 1.2.1 - Authenticated (Admin+) Arbitrary File Upload

Sep 26, 2023 Patched in 1.2.2 (249d)
Version History

Ni Purchase Order(PO) For WooCommerce Release Timeline

v1.2.3Current
Code Analysis
Analyzed Mar 17, 2026

Ni Purchase Order(PO) For WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
5
35 prepared
Unescaped Output
115
85 escaped
Nonce Checks
0
Capability Checks
0
File Operations
35
External Requests
1
Bundled Libraries
1

Bundled Libraries

dompdf

SQL Query Safety

88% prepared40 total queries

Output Escaping

43% escaped200 total outputs
Attack Surface
1 unprotected

Ni Purchase Order(PO) For WooCommerce Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_niwoopo_ajaxincludes\niwoopo-init.php:10
WordPress Hooks 6
actionadmin_menuincludes\niwoopo-init.php:8
actionadmin_enqueue_scriptsincludes\niwoopo-init.php:9
actionadmin_initincludes\niwoopo-init.php:12
filterupload_dirincludes\niwoopo-setting.php:252
actionadmin_initni-purchase-order-for-woocommerce.php:27
filterplugin_action_linksni-purchase-order-for-woocommerce.php:29
Maintenance & Trust

Ni Purchase Order(PO) For WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 31, 2024
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Ni Purchase Order(PO) For WooCommerce Developer Profile

Anzar Ahmed

26 plugins · 5K total installs

69
trust score
Avg Security Score
86/100
Avg Patch Time
228 days
View full developer profile
Detection Fingerprints

How We Detect Ni Purchase Order(PO) For WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ni-purchase-orderpo-for-woocommerce/assets/css/admin-style.css/wp-content/plugins/ni-purchase-orderpo-for-woocommerce/assets/js/admin-script.js/wp-content/plugins/ni-purchase-orderpo-for-woocommerce/assets/css/frontend.css/wp-content/plugins/ni-purchase-orderpo-for-woocommerce/assets/js/frontend.js
Script Paths
/wp-content/plugins/ni-purchase-orderpo-for-woocommerce/assets/js/admin-script.js/wp-content/plugins/ni-purchase-orderpo-for-woocommerce/assets/js/frontend.js
Version Parameters
ni-purchase-orderpo-for-woocommerce/assets/css/admin-style.css?ver=ni-purchase-orderpo-for-woocommerce/assets/js/admin-script.js?ver=ni-purchase-orderpo-for-woocommerce/assets/css/frontend.css?ver=ni-purchase-orderpo-for-woocommerce/assets/js/frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
niwoopo_titleniwoopo_submitniwoopo_btnniwoopo_btn_pdfniwoopo_btn_printniwoopo_invoice_template_wrapperniwoopo_page_wrapper
Data Attributes
data-prefix="niwoopo"data-manage_options="manage_options"data-menu="niwoopo-dashboard"
JS Globals
niwoopo_ajax_dataniwooims_ajax_dataNiWooPO_Init
FAQ

Frequently Asked Questions about Ni Purchase Order(PO) For WooCommerce