Order Filter by Source for WooCommerce Security & Risk Analysis

wordpress.org/plugins/order-filter-by-source-for-woocommerce

Allows to filter orders by the order attribution source in the dashboard.

40 active installs v1.0 PHP 5.3+ WP 3.1+ Updated Nov 23, 2024
filterorder-attributionorderswoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Order Filter by Source for WooCommerce Safe to Use in 2026?

Generally Safe

Score 92/100

Order Filter by Source for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "order-filter-by-source-for-woocommerce" plugin v1.0 exhibits a strong static security posture, with no identified attack surface entry points, dangerous functions, file operations, or external HTTP requests. All identified output operations are properly escaped, which is an excellent practice for preventing cross-site scripting (XSS) vulnerabilities. The absence of any recorded vulnerabilities in its history further suggests a well-maintained and secure plugin.

However, a significant concern arises from the handling of SQL queries. The analysis indicates that 100% of the SQL queries (2 total) are not using prepared statements. This practice is highly risky and can expose the plugin to SQL injection vulnerabilities, especially if the data used in these queries originates from user input, even if no direct entry points are immediately apparent. The lack of nonce checks and capability checks, while not immediately problematic given the zero attack surface, would become critical if any entry points were introduced in future versions or through other means.

In conclusion, while the plugin demonstrates good practices in output sanitization and has a clean vulnerability history, the unescaped SQL queries represent a substantial potential risk. This is the primary area that requires attention to ensure the plugin's continued security, especially as it interacts with sensitive order data in WooCommerce.

Key Concerns

  • SQL queries without prepared statements
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

Order Filter by Source for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Order Filter by Source for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
0
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

100% escaped7 total outputs
Attack Surface

Order Filter by Source for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwoocommerce_order_list_table_restrict_manage_ordersorder-filter-by-source-for-woocommerce.php:24
actionrestrict_manage_postsorder-filter-by-source-for-woocommerce.php:25
actionwoocommerce_order_list_table_prepare_items_query_argsorder-filter-by-source-for-woocommerce.php:27
actionpre_get_postsorder-filter-by-source-for-woocommerce.php:28
Maintenance & Trust

Order Filter by Source for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 23, 2024
PHP min version5.3
Downloads772

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

Order Filter by Source for WooCommerce Developer Profile

Misha Rudrastyh

8 plugins · 210 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Order Filter by Source for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<select name="utm_source_filter"><option value="">Filter by source</option>
FAQ

Frequently Asked Questions about Order Filter by Source for WooCommerce