POFW Option Description Security & Risk Analysis

wordpress.org/plugins/pofw-option-description

Adds descriptions to product options of the "Product Options for WooCommerce" plugin.

20 active installs v1.0.0 PHP + WP 4.7+ Updated Nov 15, 2024
option-descriptionproduct-options
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is POFW Option Description Safe to Use in 2026?

Generally Safe

Score 92/100

POFW Option Description has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "pofw-option-description" plugin v1.0.0 exhibits a generally strong security posture in its static analysis. The plugin has a minimal attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events exposed, and crucially, none of these are unprotected. The absence of dangerous function calls, file operations, and external HTTP requests further contributes to its security. However, the code analysis reveals significant areas for improvement. A concerningly low 8% of output is properly escaped, suggesting a high risk of cross-site scripting (XSS) vulnerabilities. While SQL queries are present, only a third utilize prepared statements, indicating potential SQL injection risks. The complete lack of nonce checks on any entry points is a major oversight, leaving the plugin vulnerable to cross-site request forgery (CSRF) attacks. The plugin also has a capability check, which is a positive sign for authorization, but its effectiveness is diminished by the other identified weaknesses.

The vulnerability history for this plugin is currently clean, with no recorded CVEs. This, combined with the lack of taint analysis findings and minimal static analysis red flags (apart from output escaping and SQL preparation), might suggest a well-intentioned development process or a limited scope of functionality that hasn't attracted malicious attention yet. However, the static analysis findings, particularly the unescaped output and raw SQL queries, represent real, actionable security risks that could be exploited by attackers. The absence of nonce checks is a fundamental security lapse. Despite the clean vulnerability history, the significant static analysis concerns mean the plugin is not inherently secure and requires immediate attention to address the identified vulnerabilities.

Key Concerns

  • Low percentage of properly escaped output
  • Low percentage of SQL prepared statements
  • No nonce checks implemented
Vulnerabilities
None known

POFW Option Description Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

POFW Option Description Code Analysis

Dangerous Functions
0
Raw SQL Queries
8
4 prepared
Unescaped Output
22
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

33% prepared12 total queries

Output Escaping

8% escaped24 total outputs
Attack Surface

POFW Option Description Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionadmin_enqueue_scriptsController\Adminhtml\Product.php:9
filterwoocommerce_product_data_tabsController\Adminhtml\Product.php:11
actionwoocommerce_product_data_panelsController\Adminhtml\Product.php:12
actionwp_enqueue_scriptsController\Product.php:8
actionwoocommerce_before_add_to_cart_buttonController\Product.php:9
actionwoocommerce_process_product_metaModel\Observer.php:20
filterpofw_csv_export_data_option_rowsModel\Observer.php:21
filterpofw_csv_export_data_option_value_rowsModel\Observer.php:22
actionpofw_csv_import_product_options_savedModel\Observer.php:23
actiondelete_postModel\Observer.php:24
Maintenance & Trust

POFW Option Description Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedNov 15, 2024
PHP min version
Downloads992

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

POFW Option Description Developer Profile

Pektsekye

14 plugins · 6K total installs

93
trust score
Avg Security Score
98/100
Avg Patch Time
8 days
View full developer profile
Detection Fingerprints

How We Detect POFW Option Description

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pofw-option-description/view/adminhtml/web/product/edit/main.css/wp-content/plugins/pofw-option-description/view/adminhtml/web/product/edit/main.js/wp-content/plugins/pofw-option-description/view/frontend/web/main.css/wp-content/plugins/pofw-option-description/view/frontend/web/main.js/wp-content/plugins/pofw-option-description/view/frontend/web/ui-tooltip.css
Script Paths
/wp-content/plugins/pofw-option-description/view/adminhtml/web/product/edit/main.js/wp-content/plugins/pofw-option-description/view/frontend/web/main.js
Version Parameters
pofw-option-description/view/adminhtml/web/product/edit/main.js?ver=pofw-option-description/view/adminhtml/web/product/edit/main.css?ver=pofw-option-description/view/frontend/web/main.js?ver=pofw-option-description/view/frontend/web/main.css?ver=pofw-option-description/view/frontend/web/ui-tooltip.css?ver=

HTML / DOM Fingerprints

CSS Classes
pofw_ods_product_data
FAQ

Frequently Asked Questions about POFW Option Description