WP All Export – Order Export for WooCommerce Security & Risk Analysis

wordpress.org/plugins/order-export-for-woocommerce

Drag & drop to export orders to CSV, Excel, or XML files of any format. Supports customer data, line items, date range filtering, and more with po …

3K active installs v1.0.5 PHP 7.4+ WP + Updated Jan 30, 2026
csvexportorderwoocommercexml
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP All Export – Order Export for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

WP All Export – Order Export for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "order-export-for-woocommerce" plugin, at version 1.0.5, exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding output escaping, with all identified outputs being properly escaped. The plugin also avoids making external HTTP requests and doesn't appear to have vulnerabilities recorded in its history, which is a strong indicator of a stable and well-maintained codebase. The absence of shortcodes, cron events, and REST API routes also limits the potential attack surface in these common areas. However, the presence of two instances of the `unserialize` function is a significant concern. When an attacker can control the serialized data passed to `unserialize`, it can lead to remote code execution vulnerabilities. While the static analysis didn't flag critical taint flows, the mere presence of `unserialize` without clear evidence of input sanitization or authentication checks for its input points to a potential risk that requires further scrutiny. Furthermore, the lack of any nonce checks or capability checks, combined with zero unprotected entry points, suggests that any potential exploitation of `unserialize` might not be immediately mitigated by standard WordPress security mechanisms.

Despite the lack of known CVEs and the generally clean code signals in other areas, the `unserialize` function represents a notable security weakness. The fact that 100% of outputs are escaped is commendable, but it does not negate the inherent dangers of deserializing untrusted data. The absence of historical vulnerabilities could mean that this specific vector hasn't been exploited or discovered yet, or that the data passed to `unserialize` is implicitly trusted within the plugin's context. However, as a security analyst, the principle of least privilege and input validation dictates caution. The plugin's strength lies in its clean output handling and lack of external dependencies, but its weakness is the potential for deserialization vulnerabilities, making its overall security posture moderately concerning.

Key Concerns

  • Dangerous function: unserialize detected
  • No nonce checks on entry points
  • No capability checks on entry points
  • Flows with unsanitized paths detected
Vulnerabilities
None known

WP All Export – Order Export for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP All Export – Order Export for WooCommerce Code Analysis

Dangerous Functions
2
Raw SQL Queries
1
4 prepared
Unescaped Output
0
11 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$result[$i][$k] = unserialize($v);models\model\list.php:87
unserialize$result[$k] = unserialize($v);models\model\record.php:33

SQL Query Safety

80% prepared5 total queries

Output Escaping

100% escaped11 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
force_ssl (controllers\controller.php:43)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP All Export – Order Export for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actioninitwpae-woocommerce-order-add-on.php:144
Maintenance & Trust

WP All Export – Order Export for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 30, 2026
PHP min version7.4
Downloads50K

Community Trust

Rating78/100
Number of ratings8
Active installs3K
Developer Profile

WP All Export – Order Export for WooCommerce Developer Profile

WP All Import

22 plugins · 207K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
1036 days
View full developer profile
Detection Fingerprints

How We Detect WP All Export – Order Export for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/order-export-for-woocommerce/vendor/wp-ali/wp-ali-core/assets/css/vendors/select2.css/wp-content/plugins/order-export-for-woocommerce/vendor/wp-ali/wp-ali-core/assets/js/vendors/select2.js/wp-content/plugins/order-export-for-woocommerce/assets/css/vendors/jquery-ui.css/wp-content/plugins/order-export-for-woocommerce/assets/js/vendors/jquery-ui.js/wp-content/plugins/order-export-for-woocommerce/assets/css/pmwoe-admin-page.css/wp-content/plugins/order-export-for-woocommerce/assets/js/pmwoe-admin-page.js/wp-content/plugins/order-export-for-woocommerce/assets/js/pmwoe-export-settings.js/wp-content/plugins/order-export-for-woocommerce/assets/js/pmwoe-order-fields.js+2 more
Script Paths
/wp-content/plugins/order-export-for-woocommerce/vendor/wp-ali/wp-ali-core/assets/js/vendors/select2.js/wp-content/plugins/order-export-for-woocommerce/assets/js/vendors/jquery-ui.js/wp-content/plugins/order-export-for-woocommerce/assets/js/pmwoe-admin-page.js/wp-content/plugins/order-export-for-woocommerce/assets/js/pmwoe-export-settings.js/wp-content/plugins/order-export-for-woocommerce/assets/js/pmwoe-order-fields.js/wp-content/plugins/order-export-for-woocommerce/assets/js/pmwoe-plugin-settings.js+1 more
Version Parameters
order-export-for-woocommerce/vendor/wp-ali/wp-ali-core/assets/css/vendors/select2.css?ver=order-export-for-woocommerce/vendor/wp-ali/wp-ali-core/assets/js/vendors/select2.js?ver=order-export-for-woocommerce/assets/css/vendors/jquery-ui.css?ver=order-export-for-woocommerce/assets/js/vendors/jquery-ui.js?ver=order-export-for-woocommerce/assets/css/pmwoe-admin-page.css?ver=order-export-for-woocommerce/assets/js/pmwoe-admin-page.js?ver=order-export-for-woocommerce/assets/js/pmwoe-export-settings.js?ver=order-export-for-woocommerce/assets/js/pmwoe-order-fields.js?ver=order-export-for-woocommerce/assets/js/pmwoe-plugin-settings.js?ver=order-export-for-woocommerce/assets/js/pmwoe-users.js?ver=

HTML / DOM Fingerprints

CSS Classes
pmwoe-admin-pagepmwoe-export-settingspmwoe-order-fieldspmwoe-plugin-settingspmwoe-users
HTML Comments
<!-- Plugin root dir with forward slashes as directory separator regardless of actuall DIRECTORY_SEPARATOR value --><!-- Plugin root url for referencing static content --><!-- Plugin prefix for making names unique (be aware that this variable is used in conjuction with naming convention, --> * i.e. in order to change it one must not only modify this constant but also rename all constants, classes and functions which * names composed using this prefix) --><!-- Main plugin file, Introduces MVC pattern -->+12 more
Data Attributes
data-prefix="pmwoe_"
JS Globals
PMWOE_ROOT_DIRPMWOE_ROOT_URLPMWOE_PREFIXPMWOE_VERSIONPMWOE_EDITIONpmwoe_admin_page+5 more
FAQ

Frequently Asked Questions about WP All Export – Order Export for WooCommerce