One Click Order Security & Risk Analysis

wordpress.org/plugins/one-click-order

One Click Order simplifies your WooCommerce checkout with a single-page form, online/manual payments, receipt uploads, and WooCommerce sync.

0 active installs v1.3 PHP 7.2+ WP 5.5+ Updated Jul 21, 2025
checkout-customizationone-click-ordersingle-page-checkout-woocommerceskip-woocommerce-cartwoocommerce-checkout-customization
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is One Click Order Safe to Use in 2026?

Generally Safe

Score 100/100

One Click Order has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8mo ago
Risk Assessment

The "one-click-order" v1.3 plugin exhibits a generally positive security posture, with no known vulnerabilities or critical code signals suggesting immediate risks. The absence of dangerous functions, file operations, and external HTTP requests is commendable. Furthermore, the plugin uses prepared statements for all SQL queries, which is a strong defense against SQL injection. The presence of nonce checks is also a positive indicator. However, a significant concern arises from the output escaping, where 58% of outputs are not properly escaped. This creates a risk of Cross-Site Scripting (XSS) vulnerabilities, especially if user-supplied data is being displayed without sanitization.

The plugin's vulnerability history is clean, with no recorded CVEs. This, combined with the static analysis results, suggests the developers are likely following good security practices. The limited attack surface, with no unprotected entry points identified in the static analysis, further reinforces this. Despite the strengths, the unescaped output represents a tangible risk that could be exploited. Therefore, while the plugin appears robust in many areas, the XSS potential due to insufficient output escaping needs to be addressed.

Key Concerns

  • Insufficient output escaping detected
Vulnerabilities
None known

One Click Order Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

One Click Order Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
88
123 escaped
Nonce Checks
4
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

58% escaped211 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
oneclickorder_render_order_form (includes\form-render.php:11)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

One Click Order Attack Surface

Entry Points5
Unprotected0

Shortcodes 5

[oneclickorder_buy_now_button] includes\form-button.php:84
[oneclickorder_one_click_button] includes\form-button.php:85
[oneclickorder_one_click_order] one-click-order.php:28
[oneclickorder_one_click_button] one-click-order.php:29
[oneclickorder_buy_button] one-click-order.php:30
WordPress Hooks 15
actionplugins_loadedone-click-order.php:26
filterthe_contentone-click-order.php:31
filterthe_excerptone-click-order.php:32
filterwoocommerce_short_descriptionone-click-order.php:33
actionadmin_menuone-click-order.php:37
actionadmin_initone-click-order.php:38
actioninitone-click-order.php:39
actionwp_enqueue_scriptsone-click-order.php:130
actionadmin_enqueue_scriptsone-click-order.php:133
filterthe_titleone-click-order.php:184
filterbody_classone-click-order.php:194
filterthe_contentone-click-order.php:202
actiontemplate_redirectone-click-order.php:211
actionwp_enqueue_scriptsone-click-order.php:228
actionadmin_enqueue_scriptsone-click-order.php:255
Maintenance & Trust

One Click Order Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJul 21, 2025
PHP min version7.2
Downloads559

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

One Click Order Developer Profile

Plugin Nest

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect One Click Order

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/one-click-order/assets/css/oneclickorder-style.css
Script Paths
/wp-content/plugins/one-click-order/assets/js/oneclickorder-admin.js
Version Parameters
oneclickorder-style.css?ver=1.1oneclickorder-admin.js?ver=1.1

HTML / DOM Fingerprints

CSS Classes
oneclickorder-hide-headeroneclickorder-buy-now-product-wrapper
Data Attributes
data-product_id
Shortcode Output
[oneclickorder_one_click_order][oneclickorder_one_click_button[oneclickorder_buy_button
FAQ

Frequently Asked Questions about One Click Order