Order Coupon Field for WooCommerce Security & Risk Analysis

wordpress.org/plugins/order-coupon-field-for-woocommerce

Records each coupon code used for an order in an order meta field for reporting purposes.

10 active installs v1.0.1 PHP + WP 3.5+ Updated Jun 17, 2017
completecompletedorderstatuswoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Order Coupon Field for WooCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

Order Coupon Field for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "order-coupon-field-for-woocommerce" plugin version 1.0.1 exhibits a generally strong security posture based on the provided static analysis. The plugin has no known vulnerabilities in its history, and the static analysis reveals a clean slate regarding dangerous functions, SQL injection risks (all queries use prepared statements), file operations, and external HTTP requests. The absence of a large attack surface with entry points like AJAX handlers, REST API routes, or shortcodes further contributes to its security. The presence of a nonce check and a capability check on at least one interaction indicates good practice in preventing CSRF attacks and controlling access. However, a weakness is identified in the output escaping, where only 43% of outputs are properly escaped. This leaves a potential for cross-site scripting (XSS) vulnerabilities if sensitive data is displayed without proper sanitization, particularly in the 57% of unescaped outputs. While taint analysis shows no critical or high severity flows, the incomplete output escaping is a notable concern that requires attention to ensure comprehensive security.

Key Concerns

  • Insufficient output escaping
Vulnerabilities
None known

Order Coupon Field for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Order Coupon Field for WooCommerce Release Timeline

v1.0.1Current
v1.0.0
Code Analysis
Analyzed Mar 17, 2026

Order Coupon Field for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
3 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

43% escaped7 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
pp_wccptf_page (order-coupon-field-for-woocommerce.php:66)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Order Coupon Field for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwoocommerce_new_order_itemorder-coupon-field-for-woocommerce.php:21
actionwoocommerce_order_add_couponorder-coupon-field-for-woocommerce.php:39
actionadmin_menuorder-coupon-field-for-woocommerce.php:52
Maintenance & Trust

Order Coupon Field for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJun 17, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Order Coupon Field for WooCommerce Developer Profile

WP Zone

22 plugins · 40K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
124 days
View full developer profile
Detection Fingerprints

How We Detect Order Coupon Field for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
order-coupon-field-for-woocommerce/order-coupon-field-for-woocommerce.php?ver=order-coupon-field-for-woocommerce/plugin-credit.php?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Order Coupon Field for WooCommerce