Price Comparison Shopping Engine Security & Risk Analysis

wordpress.org/plugins/price-comparison-shopping-engine

This Price Comparison System is a great tool to get additional income from your website.

10 active installs v1.0.7 PHP + WP 4.0.1+ Updated Unknown
comparison-shopping-engineprice-compariso-systemprice-comparisonprice-comparison-shopping-engineprice-comparison-website
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Price Comparison Shopping Engine Safe to Use in 2026?

Generally Safe

Score 100/100

Price Comparison Shopping Engine has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "price-comparison-shopping-engine" plugin version 1.0.7 exhibits a mixed security posture. While it demonstrates strengths by avoiding dangerous functions, raw SQL queries, file operations, and external HTTP requests, its handling of user-supplied input is a significant concern. The static analysis reveals that 100% of its outputs are unescaped, which could lead to cross-site scripting (XSS) vulnerabilities if the data originates from user input. Additionally, two AJAX handlers lack authentication checks, creating potential entry points for unauthorized actions.

The taint analysis indicates two flows with unsanitized paths, although they were not classified as critical or high severity. This suggests a potential for input validation issues that could be exploited, even if not immediately leading to severe consequences. The plugin's clean vulnerability history is a positive indicator, suggesting that developers have either been diligent in addressing past issues or have not yet encountered significant security flaws. However, this history should not detract from the immediate risks identified in the code.

In conclusion, while the plugin has some good security practices in place, the unescaped output and unprotected AJAX handlers present tangible risks. These issues, coupled with the unsanitized taint flows, necessitate careful attention. A more robust approach to input validation and output sanitization, along with implementing proper authentication for all AJAX actions, would significantly improve its security. The lack of past CVEs is a positive, but the current static analysis findings point to areas that require immediate remediation.

Key Concerns

  • Unprotected AJAX handlers
  • Unescaped output for all outputs
  • Unsanitized paths in taint flows
Vulnerabilities
None known

Price Comparison Shopping Engine Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Price Comparison Shopping Engine Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
0 escaped
Nonce Checks
2
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped12 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
pcs_save_fields (pcs_goodspack.php:168)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Price Comparison Shopping Engine Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

authwp_ajax_getfieldspcs_goodspack.php:44
authwp_ajax_savepcs_goodspack.php:45

Shortcodes 1

[goodspack] pcs_goodspack.php:60
WordPress Hooks 5
actionadmin_enqueue_scriptspcs_goodspack.php:43
actionadmin_menupcs_goodspack.php:48
actioninitpcs_goodspack.php:61
filtersingle_templatepcs_goodspack.php:62
actionplugins_loadedpcs_goodspack.php:63
Maintenance & Trust

Price Comparison Shopping Engine Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedUnknown
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Price Comparison Shopping Engine Developer Profile

Dmitry V. (CEO of "UKR Solution")

5 plugins · 3K total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
18 days
View full developer profile
Detection Fingerprints

How We Detect Price Comparison Shopping Engine

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/price-comparison-shopping-engine/js/gp_script.js/wp-content/plugins/price-comparison-shopping-engine/styles/gp_style.css
Script Paths
/wp-content/plugins/price-comparison-shopping-engine/js/gp_script.js
Version Parameters
price-comparison-shopping-engine/js/gp_script.js?ver=price-comparison-shopping-engine/styles/gp_style.css?ver=

HTML / DOM Fingerprints

JS Globals
pcs_goodspack
Shortcode Output
[goodspack]
FAQ

Frequently Asked Questions about Price Comparison Shopping Engine