Orders Pro Security & Risk Analysis

wordpress.org/plugins/orders-pro

Professionally Customize admin-side orders page and enjoy it.

10 active installs v1.8 PHP 7.0+ WP 5.0+ Updated Unknown
order-previewordered-productsorders-prowc-orderswoocommerce-orders
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Orders Pro Safe to Use in 2026?

Generally Safe

Score 100/100

Orders Pro has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "orders-pro" plugin v1.8 exhibits a concerning security posture primarily due to its unprotected entry points. While the plugin demonstrates good practices by avoiding dangerous functions, raw SQL queries, file operations, and external HTTP requests, the lack of authentication checks on its two AJAX handlers presents a significant risk. This means any unauthenticated user could potentially trigger these handlers, leading to unintended actions or information disclosure.

The static analysis reveals a high percentage of unsanitized output, indicating a strong possibility of cross-site scripting (XSS) vulnerabilities. The taint analysis also highlights flows with unsanitized paths, further reinforcing the XSS risk. The absence of nonce checks on AJAX handlers is a critical oversight, as it fails to protect against cross-site request forgery (CSRF) attacks.

The vulnerability history shows no known CVEs, which is positive. However, this alone does not guarantee security, especially given the identified weaknesses in the code. The plugin has a clean history, which might suggest that it hasn't been a target or that previous vulnerabilities were effectively addressed. Nevertheless, the current code analysis points to exploitable weaknesses that need immediate attention.

Key Concerns

  • AJAX handlers without auth checks
  • Low percentage of properly escaped output
  • Flows with unsanitized paths (taint analysis)
  • No nonce checks on AJAX handlers
  • No capability checks
Vulnerabilities
None known

Orders Pro Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Orders Pro Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
56
15 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

21% escaped71 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
<Options> (functions\Options.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Orders Pro Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_OrderPro_settings_savefunctions\Options.php:14
authwp_ajax_orderPro_Price_newfunctions\OrdersPreview\PriceColumn.php:9
WordPress Hooks 12
filteradmin_body_classfunctions\Orders.php:3
filterwoocommerce_admin_order_preview_line_item_column_productidfunctions\OrdersPreview\columns.php:6
filterwoocommerce_admin_order_preview_line_item_column_categoryfunctions\OrdersPreview\columns.php:17
filterwoocommerce_admin_order_preview_line_item_column_imagefunctions\OrdersPreview\columns.php:22
filterwoocommerce_admin_order_preview_line_item_column_stockfunctions\OrdersPreview\columns.php:30
filterwoocommerce_admin_order_preview_line_item_column_vendorfunctions\OrdersPreview\columns.php:34
filterwoocommerce_admin_order_preview_line_item_column_pricefunctions\OrdersPreview\PriceColumn.php:3
filterwoocommerce_admin_order_preview_line_item_columnsfunctions\OrdersPreview.php:5
actioninitorders-pro.php:42
actionadmin_enqueue_scriptsorders-pro.php:45
actionadmin_menuorders-pro.php:49
actionadmin_noticesorders-pro.php:189
Maintenance & Trust

Orders Pro Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedUnknown
PHP min version7.0
Downloads2K

Community Trust

Rating84/100
Number of ratings5
Active installs10
Developer Profile

Orders Pro Developer Profile

Reza Hajizadeh

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Orders Pro

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/orders-pro/assets/OrdersPro-rtl.css/wp-content/plugins/orders-pro/assets/OrdersPro.css/wp-content/plugins/orders-pro/assets/options.js/wp-content/plugins/orders-pro/assets/OrdersPro.js
Script Paths
/wp-content/plugins/orders-pro/assets/options.js/wp-content/plugins/orders-pro/assets/OrdersPro.js
Version Parameters
orders-pro/assets/OrdersPro-rtl.css?ver=orders-pro/assets/OrdersPro.css?ver=orders-pro/assets/options.js?ver=orders-pro/assets/OrdersPro.js?ver=

HTML / DOM Fingerprints

CSS Classes
premium_ordersproOSPO_tooltip
Data Attributes
data-tooltip="Premium Feature"
JS Globals
OrdersPro_localizeOrdersPro_versionOrderPro_DIROrdersPro_Pages_pathOSPO_img_dir
FAQ

Frequently Asked Questions about Orders Pro