Orbisius CyberStore Security & Risk Analysis

wordpress.org/plugins/orbisius-cyberstore

Start selling your digital products such as software, e-books, reports in minutes with a simple Buy Now button.

10 active installs v2.1.7 PHP + WP 2.8+ Updated Jun 2, 2017
ecommerceestoreonline-shopshopping-cartstore
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Orbisius CyberStore Safe to Use in 2026?

Generally Safe

Score 85/100

Orbisius CyberStore has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The static analysis of orbisius-cyberstore v2.1.7 reveals several concerning areas despite a seemingly small attack surface and no recorded CVEs. While there are no obvious vulnerabilities in AJAX handlers or REST API routes due to the presence of authentication and permission checks, the code contains a dangerous use of `unserialize` which is a common vector for remote code execution if user-supplied data is unserialized without proper validation. Furthermore, all SQL queries are executed without prepared statements, increasing the risk of SQL injection attacks. The taint analysis indicates multiple flows with unsanitized paths, four of which are classified as high severity, suggesting that data entering the application is not being sufficiently cleaned before being used in sensitive operations. The low percentage of properly escaped output (9%) also points to potential Cross-Site Scripting (XSS) vulnerabilities.

Despite the absence of documented vulnerabilities, the code quality signals are weak. The lack of nonce checks on the identified entry points (AJAX handlers and shortcodes) is a significant oversight, leaving them potentially vulnerable to Cross-Site Request Forgery (CSRF) attacks. The high number of file operations combined with external HTTP requests also warrants closer inspection for potential security implications. The vulnerability history being clean could be attributed to luck or a lack of deep security auditing in the past, rather than inherent robust security. Overall, while the plugin doesn't have publicly known vulnerabilities, the static analysis highlights critical areas of concern that significantly lower its security posture.

Key Concerns

  • Use of unserialize function
  • SQL queries not using prepared statements
  • High severity unsanitized taint flows
  • Low percentage of output escaping
  • Missing nonce checks on entry points
Vulnerabilities
None known

Orbisius CyberStore Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Orbisius CyberStore Code Analysis

Dangerous Functions
1
Raw SQL Queries
6
0 prepared
Unescaped Output
265
25 escaped
Nonce Checks
0
Capability Checks
5
File Operations
15
External Requests
2
Bundled Libraries
1

Dangerous Functions Found

unserialize$buff = unserialize($buff);orbisius-cyberstore.php:2964

Bundled Libraries

TinyMCE

SQL Query Safety

0% prepared6 total queries

Output Escaping

9% escaped290 total outputs
Data Flows
5 unsanitized

Data Flow Analysis

5 flows5 with unsanitized paths
<menu.settings> (menu.settings.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Orbisius CyberStore Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 2

authwp_ajax_cyber_store_ajax_render_popup_contentorbisius-cyberstore.php:1717
authwp_ajax_cyber_store_ajax_render_popup_contentorbisius-cyberstore.php:1718

Shortcodes 1

[digishop] orbisius-cyberstore.php:228
WordPress Hooks 15
actioninitorbisius-cyberstore.php:41
actioninitorbisius-cyberstore.php:42
actionplugins_loadedorbisius-cyberstore.php:171
actionplugins_loadedorbisius-cyberstore.php:175
actionadmin_menuorbisius-cyberstore.php:212
actionadmin_initorbisius-cyberstore.php:213
actionadmin_initorbisius-cyberstore.php:214
actionadmin_initorbisius-cyberstore.php:215
actionadmin_noticesorbisius-cyberstore.php:216
actionwp_headorbisius-cyberstore.php:220
actionwp_footerorbisius-cyberstore.php:221
actionget_footerorbisius-cyberstore.php:231
filterplugin_action_linksorbisius-cyberstore.php:999
filtermce_external_pluginsorbisius-cyberstore.php:1714
filtermce_buttonsorbisius-cyberstore.php:1715
Maintenance & Trust

Orbisius CyberStore Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedJun 2, 2017
PHP min version
Downloads8K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Orbisius CyberStore Developer Profile

Svetoslav Marinov

26 plugins · 12K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
722 days
View full developer profile
Detection Fingerprints

How We Detect Orbisius CyberStore

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/orbisius-cyberstore/js/orbisius-cyberstore.js/wp-content/plugins/orbisius-cyberstore/css/orbisius-cyberstore.css
Script Paths
/wp-content/plugins/orbisius-cyberstore/js/orbisius-cyberstore.js
Version Parameters
orbisius-cyberstore/js/orbisius-cyberstore.js?ver=orbisius-cyberstore/css/orbisius-cyberstore.css?ver=

HTML / DOM Fingerprints

CSS Classes
orbisius-cyberstore-products-listorbisius-cyberstore-product-itemorbisius-cyberstore-add-to-cart-button
HTML Comments
<!-- Orbisius CyberStore -- Start Code --><!-- Orbisius CyberStore -- End Code --><!-- Orbisius CyberStore Shortcode: ORBISIUS_CYBER_STORE -->
Data Attributes
data-product-iddata-product-pricedata-buy-button-text
JS Globals
window.orbisius_cyberstore_settings
Shortcode Output
[ORBISIUS_CYBER_STORE]
FAQ

Frequently Asked Questions about Orbisius CyberStore