Product Base Order for WooCommerce Security & Risk Analysis

wordpress.org/plugins/product-base-order-for-woocommerce

Product Base Order for WooCommerce

0 active installs v1.0.0 PHP 5.6+ WP 4.4+ Updated Jun 4, 2021
orderproductproduct-base-orderwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Product Base Order for WooCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

Product Base Order for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The plugin "product-base-order-for-woocommerce" v1.0.0 exhibits a mixed security posture. On one hand, it demonstrates good practices by using prepared statements for all SQL queries and a significant majority of its output is properly escaped. The absence of file operations and external HTTP requests further reduces potential attack vectors. Its vulnerability history is clean, with no recorded CVEs, suggesting a generally secure development history.

However, the static analysis reveals significant concerns. The presence of the `create_function` function is a major red flag, as it can lead to arbitrary code execution if not handled with extreme caution, and it's a deprecated and insecure practice. Furthermore, the lack of nonce checks and capability checks on its sole shortcode is a critical omission. While there are no unescaped outputs on its limited attack surface, the potential for code execution via `create_function` and privilege escalation or unauthorized actions via the unprotected shortcode presents substantial risks.

In conclusion, while the plugin has a clean vulnerability history and avoids common pitfalls like raw SQL and excessive attack vectors, the identified code signals and lack of security checks on its entry points introduce significant potential for exploitation. The use of `create_function` and the unprotected shortcode are serious weaknesses that require immediate attention.

Key Concerns

  • Use of dangerous function: create_function
  • Missing nonce check on entry points
  • Missing capability check on entry points
  • Output escaping not fully comprehensive
Vulnerabilities
None known

Product Base Order for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Product Base Order for WooCommerce Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
2 prepared
Unescaped Output
22
52 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

create_function$callback = create_function( '', 'echo "' . str_replace( '"', '\"', $section['desc'] ) . '";' );includes\Admin\SettingsFields.php:257

Bundled Libraries

DataTables

SQL Query Safety

100% prepared2 total queries

Output Escaping

70% escaped74 total outputs
Attack Surface

Product Base Order for WooCommerce Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[product_base_order_wc] includes\ProductBaseOrder.php:18
WordPress Hooks 10
actionadmin_noticesincludes\Admin\Admin.php:18
actionadmin_menuincludes\Admin\Menus.php:18
actionadmin_initincludes\Admin\Menus.php:19
actionadmin_enqueue_scriptsincludes\Assets.php:18
actionwp_enqueue_scriptsincludes\Assets.php:19
actionwoocommerce_after_single_product_summaryincludes\ProductBaseOrder.php:24
actionwoocommerce_after_single_productincludes\ProductBaseOrder.php:28
actionplugins_loadedproduct-base-order-for-woocommerce.php:102
actioninitproduct-base-order-for-woocommerce.php:214
actioninitproduct-base-order-for-woocommerce.php:215
Maintenance & Trust

Product Base Order for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedJun 4, 2021
PHP min version5.6
Downloads787

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Product Base Order for WooCommerce Developer Profile

Masud Hasan

5 plugins · 60 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Product Base Order for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/product-base-order-for-woocommerce/assets/css/admin.css/wp-content/plugins/product-base-order-for-woocommerce/assets/css/style.css/wp-content/plugins/product-base-order-for-woocommerce/assets/js/admin.js/wp-content/plugins/product-base-order-for-woocommerce/assets/js/frontend.js
Script Paths
/wp-content/plugins/product-base-order-for-woocommerce/assets/js/admin.js/wp-content/plugins/product-base-order-for-woocommerce/assets/js/frontend.js
Version Parameters
product-base-order-for-woocommerce/assets/css/admin.css?ver=product-base-order-for-woocommerce/assets/css/style.css?ver=product-base-order-for-woocommerce/assets/js/admin.js?ver=product-base-order-for-woocommerce/assets/js/frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpr-product-base-order-wc
HTML Comments
Copyright (c) 2021 WP Realizer (email: wprealizer@gmail.com). All rights reserved.Released under the GPL licensehttp://www.opensource.org/licenses/gpl-license.phpThis is an add-on for WordPress+12 more
JS Globals
wpr_product_base_order_wc
FAQ

Frequently Asked Questions about Product Base Order for WooCommerce