Product Configurations Table Security & Risk Analysis

wordpress.org/plugins/product-configurations-table

Displays product options as a table with selectable values.

0 active installs v1.0.0 PHP + WP 4.7+ Updated Unknown
configurations-tablecustomizable-productproduct-options
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Product Configurations Table Safe to Use in 2026?

Generally Safe

Score 100/100

Product Configurations Table has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "product-configurations-table" plugin version 1.0.0 exhibits a mixed security posture. On one hand, the plugin demonstrates good practice by having a seemingly small attack surface with no recorded AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without authentication or permission checks. Furthermore, the absence of any known vulnerabilities or CVEs in its history is a positive indicator of past security diligence.

However, the static analysis reveals significant areas of concern. The code signals indicate that only 14% of output is properly escaped, which presents a high risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled carefully. While there is one capability check, the complete lack of nonce checks on any potential entry points, coupled with the fact that 40% of SQL queries are not using prepared statements, suggests potential vulnerabilities to SQL injection and cross-site request forgery (CSRF).

The taint analysis, while limited in scope, did identify two flows with unsanitized paths. While these did not escalate to critical or high severity in this analysis, they are concerning as they indicate potential for path traversal vulnerabilities. The presence of file operations, even without external HTTP requests, adds another layer of potential risk if not implemented with strict validation. The plugin's strengths lie in its limited attack surface and clean vulnerability history, but these are overshadowed by critical weaknesses in output escaping, SQL query sanitization, and the absence of essential security checks like nonces, leading to a moderate to high overall risk.

Key Concerns

  • Output escaping is poor (14%)
  • SQL queries are not fully prepared (40%)
  • No nonce checks found
  • Unsanitized paths in taint analysis
  • File operations present
Vulnerabilities
None known

Product Configurations Table Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Product Configurations Table Code Analysis

Dangerous Functions
0
Raw SQL Queries
9
6 prepared
Unescaped Output
25
4 escaped
Nonce Checks
0
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0

SQL Query Safety

40% prepared15 total queries

Output Escaping

14% escaped29 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
execute (Controller\Adminhtml\Ocf\Settings.php:19)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Product Configurations Table Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionadmin_enqueue_scriptsController\Adminhtml\Product.php:9
filterwoocommerce_product_data_tabsController\Adminhtml\Product.php:11
actionwoocommerce_product_data_panelsController\Adminhtml\Product.php:12
actionwp_enqueue_scriptsController\Product.php:8
actionwoocommerce_before_add_to_cart_buttonController\Product.php:9
actionwoocommerce_process_product_metaModel\Observer.php:16
actiondelete_postModel\Observer.php:17
actionadmin_menuproduct-configurations-table.php:64
actioninitproduct-configurations-table.php:81
actionbefore_woocommerce_initproduct-configurations-table.php:146
Maintenance & Trust

Product Configurations Table Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version
Downloads920

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Product Configurations Table Developer Profile

Pektsekye

14 plugins · 6K total installs

93
trust score
Avg Security Score
98/100
Avg Patch Time
8 days
View full developer profile
Detection Fingerprints

How We Detect Product Configurations Table

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/product-configurations-table/view/adminhtml/web/product/edit/main.css/wp-content/plugins/product-configurations-table/view/adminhtml/web/product/edit/main.js/wp-content/plugins/product-configurations-table/view/frontend/web/main.css/wp-content/plugins/product-configurations-table/view/frontend/web/main.js
Script Paths
/wp-content/plugins/product-configurations-table/view/adminhtml/web/product/edit/main.js/wp-content/plugins/product-configurations-table/view/frontend/web/main.js

HTML / DOM Fingerprints

CSS Classes
product-configurations-table
HTML Comments
<!-- Pektsekye Option Configurations -->
Data Attributes
data-product-id
JS Globals
Pektsekye_OCF
FAQ

Frequently Asked Questions about Product Configurations Table