
Notify For Purchase Security & Risk Analysis
wordpress.org/plugins/notify-for-purchaseNotify For Purchase allows you to get notified about every new purchase on your website instantly when a customer completes their order!
Is Notify For Purchase Safe to Use in 2026?
Generally Safe
Score 92/100Notify For Purchase has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "notify-for-purchase" v1.5.3 plugin demonstrates a strong security posture based on the provided static analysis and vulnerability history. The complete absence of identified entry points like AJAX handlers, REST API routes, shortcodes, and cron events, particularly those without authentication checks, significantly minimizes the plugin's attack surface. Furthermore, the code signals indicate good development practices, with all SQL queries utilizing prepared statements and all output being properly escaped. The lack of file operations and the controlled use of external HTTP requests also contribute positively to its security.
The taint analysis shows no flows with unsanitized paths, indicating that user-supplied data is likely being handled safely. The vulnerability history is also remarkably clean, with zero known CVEs, unpatched vulnerabilities, or recorded common vulnerability types. This suggests a history of secure development and maintenance.
Overall, the plugin appears to be very secure. The primary area of potential concern, though minimal, lies in the 4 external HTTP requests, which could theoretically be a vector if the external services are compromised or if the requests themselves are not properly secured (though the data doesn't explicitly indicate this is an issue). However, given the lack of other detected vulnerabilities and the positive indicators in the analysis, the risk is assessed as low. The plugin's strengths lie in its minimal attack surface and adherence to secure coding practices.
Notify For Purchase Security Vulnerabilities
Notify For Purchase Code Analysis
Output Escaping
Data Flow Analysis
Notify For Purchase Attack Surface
WordPress Hooks 6
Maintenance & Trust
Notify For Purchase Maintenance & Trust
Maintenance Signals
Community Trust
Notify For Purchase Alternatives
No alternatives data available yet.
Notify For Purchase Developer Profile
1 plugin · 0 total installs
How We Detect Notify For Purchase
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/notify-for-purchase/css/notify-admin-style.css/wp-content/plugins/notify-for-purchase/css/notify-frontend-style.css/wp-content/plugins/notify-for-purchase/js/notify-admin-script.js/wp-content/plugins/notify-for-purchase/js/notify-frontend-script.js/wp-content/plugins/notify-for-purchase/js/notify-admin-script.js/wp-content/plugins/notify-for-purchase/js/notify-frontend-script.jsnotify-for-purchase/css/notify-admin-style.css?ver=notify-for-purchase/css/notify-frontend-style.css?ver=notify-for-purchase/js/notify-admin-script.js?ver=notify-for-purchase/js/notify-frontend-script.js?ver=HTML / DOM Fingerprints
notify-admin-tabsnav-tab-activenotify-admin-settingsnotify-new-purchase-noticenotify-purchase-detailsdata-notify-order-iddata-notify-product-namedata-notify-customer-namedata-notify-order-totalnotify_vars