ProductViewer Security & Risk Analysis

wordpress.org/plugins/productviewer

Product Viewer is an easy to use WooCommerce 3D product variation plugin. It offers an aesthetic and professional experience to select colors for your …

0 active installs v1.0.0 PHP 7.0+ WP 4.7+ Updated Jun 22, 2022
3d-productproduct-variationproduct-colorsswatcheswoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ProductViewer Safe to Use in 2026?

Generally Safe

Score 85/100

ProductViewer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "productviewer" v1.0.0 plugin exhibits a generally strong security posture based on the provided static analysis. The complete absence of identified AJAX handlers, REST API routes, shortcodes, and cron events, coupled with zero recorded vulnerabilities (CVEs), suggests a well-contained and potentially secure plugin. The code signals also indicate good development practices, with no dangerous functions, 100% of SQL queries using prepared statements, and a high rate of output escaping (96%). The lack of file operations and external HTTP requests further minimizes the attack surface.

However, the analysis does raise a few points for consideration. The absence of any identified entry points (AJAX, REST API, shortcodes, cron) is unusual and could indicate either an extremely specialized plugin or a limitation in the static analysis tool's ability to discover all potential interaction points. More importantly, the plugin has zero nonce checks and zero capability checks. While the current analysis found no unprotected entry points, this lack of fundamental security checks means that if any new entry points were introduced or discovered, they would be immediately unprotected, posing a significant risk. The vulnerability history is clean, which is a strong positive, but this must be considered in conjunction with the missing authorization checks.

In conclusion, "productviewer" v1.0.0 appears to be built with secure coding practices for the aspects it does implement. Its lack of known vulnerabilities and use of prepared statements are commendable. The primary concern lies in the complete absence of nonce and capability checks, which represents a significant oversight in authorization that could lead to vulnerabilities if the plugin's interaction surface expands or is misconfigured. The absence of identified entry points warrants further investigation to ensure the analysis is comprehensive.

Key Concerns

  • Missing nonce checks on potential entry points
  • Missing capability checks on potential entry points
Vulnerabilities
None known

ProductViewer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

ProductViewer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
24 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

96% escaped25 total outputs
Attack Surface

ProductViewer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
actionadmin_initproductViewer.php:32
actionwp_body_openproductViewer.php:33
actionwoocommerce_product_quick_edit_startproductViewer.php:34
actionwoocommerce_before_add_to_cart_formproductViewer.php:36
actionwoocommerce_product_options_general_product_dataproductViewer.php:37
actionwoocommerce_process_product_metaproductViewer.php:38
actionwoocommerce_product_quick_edit_saveproductViewer.php:39
actionadmin_menuproductViewer.php:41
filterwoocommerce_single_product_image_thumbnail_htmlproductViewer.php:45
actionwoocommerce_before_add_to_cart_buttonproductViewer.php:50
filterwoocommerce_add_to_cart_validationproductViewer.php:54
filterwoocommerce_add_cart_item_dataproductViewer.php:58
filterwoocommerce_get_item_dataproductViewer.php:62
actionwoocommerce_add_order_item_metaproductViewer.php:67
filterwoocommerce_order_item_productproductViewer.php:71
filterwoocommerce_email_order_meta_fieldsproductViewer.php:75
Maintenance & Trust

ProductViewer Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedJun 22, 2022
PHP min version7.0
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

ProductViewer Developer Profile

Ofek Nakar

8 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ProductViewer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/productviewer/css/adminStyles.css/wp-content/plugins/productviewer/css/frontStyles.css/wp-content/plugins/productviewer/js/viewerAdmin.js/wp-content/plugins/productviewer/js/viewerFront.js/wp-content/plugins/productviewer/three/controls.js/wp-content/plugins/productviewer/three/fbx.js/wp-content/plugins/productviewer/three/glb.js/wp-content/plugins/productviewer/three/three.js+1 more
Script Paths
/wp-content/plugins/productviewer/js/viewerAdmin.js/wp-content/plugins/productviewer/js/viewerFront.js/wp-content/plugins/productviewer/three/controls.js/wp-content/plugins/productviewer/three/fbx.js/wp-content/plugins/productviewer/three/glb.js/wp-content/plugins/productviewer/three/three.js+1 more
Version Parameters
productviewer/css/adminStyles.css?ver=productviewer/css/frontStyles.css?ver=productviewer/js/viewerAdmin.js?ver=productviewer/js/viewerFront.js?ver=productviewer/three/controls.js?ver=productviewer/three/fbx.js?ver=productviewer/three/glb.js?ver=productviewer/three/three.js?ver=productviewer/three/zilb.js?ver=

HTML / DOM Fingerprints

CSS Classes
model_viewer_product_buttonmodel_viewer_product_containerviewer_canvascredit_viewer_frontmodel_product_viewerdesc_notetutorial_vidmaple_logo
Data Attributes
data-displaydata-modeldata-inst
FAQ

Frequently Asked Questions about ProductViewer