
PDF Catalog for WooCommerce Security & Risk Analysis
wordpress.org/plugins/pdf-catalog-woocommerceGenerate dynamic PDF catalogs for WooCommerce products. Allow customers to download shop, category, or single product catalogs including images, price …
Is PDF Catalog for WooCommerce Safe to Use in 2026?
Generally Safe
Score 99/100PDF Catalog for WooCommerce has a strong security track record. Known vulnerabilities have been patched promptly.
The "pdf-catalog-woocommerce" v3.0 plugin exhibits a generally good security posture with strong adherence to secure coding practices in several key areas. The complete absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests is commendable. Furthermore, the robust use of prepared statements for all SQL queries significantly mitigates SQL injection risks. The presence of nonces and capability checks, while not exhaustive across all entry points, indicates an awareness of authentication and authorization best practices. However, a notable concern arises from the REST API, where 2 out of 7 routes lack permission callbacks. This creates an unprotected attack surface that could be exploited if these endpoints handle user-supplied data without proper authorization checks, potentially leading to unauthorized actions or data leakage.
The vulnerability history, while showing no currently unpatched CVEs, does reveal a past "Cross-site Scripting" vulnerability. This, coupled with the 75% output escaping rate, suggests a potential for lingering XSS vulnerabilities if not all outputs are meticulously sanitized. The bundled Select2 v3.4.8 library is also outdated, which could represent an indirect attack vector if vulnerabilities are discovered in that specific version. Overall, the plugin has strengths in its core data handling but requires attention to its REST API authorization and output sanitization to achieve a fully secure state.
Key Concerns
- REST API routes without permission callbacks
- Outdated bundled library (Select2 v3.4.8)
- 25% of output not properly escaped
PDF Catalog for WooCommerce Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
PDF Catalog Woocommerce <= 2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
PDF Catalog for WooCommerce Code Analysis
Bundled Libraries
Output Escaping
PDF Catalog for WooCommerce Attack Surface
REST API Routes 7
Shortcodes 2
WordPress Hooks 15
Maintenance & Trust
PDF Catalog for WooCommerce Maintenance & Trust
Maintenance Signals
Community Trust
PDF Catalog for WooCommerce Alternatives
No alternatives data available yet.
PDF Catalog for WooCommerce Developer Profile
26 plugins · 12K total installs
How We Detect PDF Catalog for WooCommerce
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/pdf-catalog-woocommerce/build/admin/admin.js/wp-content/plugins/pdf-catalog-woocommerce/build/admin/admin.css/wp-content/plugins/pdf-catalog-woocommerce/build/admin/admin.jspdf-catalog-woocommerce/build/admin/admin.js?ver=1.0pdf-catalog-woocommerce/build/admin/admin.css?ver=1HTML / DOM Fingerprints
gmwcp-react-admin-styleid="GMWCP-admin-root"gmwcp_wp_ajax/wp-json/gmwcp/v1/moreplugin/wp-json/gmwcp/v1/get-settings/wp-json/gmwcp/v1/save-settings/wp-json/gmwcp/v1/save-customfield/wp-json/gmwcp/v1/delete-customfield