
ProductViewer Security & Risk Analysis
wordpress.org/plugins/productviewerProduct Viewer is an easy to use WooCommerce 3D product variation plugin. It offers an aesthetic and professional experience to select colors for your …
Is ProductViewer Safe to Use in 2026?
Generally Safe
Score 85/100ProductViewer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "productviewer" v1.0.0 plugin exhibits a generally strong security posture based on the provided static analysis. The complete absence of identified AJAX handlers, REST API routes, shortcodes, and cron events, coupled with zero recorded vulnerabilities (CVEs), suggests a well-contained and potentially secure plugin. The code signals also indicate good development practices, with no dangerous functions, 100% of SQL queries using prepared statements, and a high rate of output escaping (96%). The lack of file operations and external HTTP requests further minimizes the attack surface.
However, the analysis does raise a few points for consideration. The absence of any identified entry points (AJAX, REST API, shortcodes, cron) is unusual and could indicate either an extremely specialized plugin or a limitation in the static analysis tool's ability to discover all potential interaction points. More importantly, the plugin has zero nonce checks and zero capability checks. While the current analysis found no unprotected entry points, this lack of fundamental security checks means that if any new entry points were introduced or discovered, they would be immediately unprotected, posing a significant risk. The vulnerability history is clean, which is a strong positive, but this must be considered in conjunction with the missing authorization checks.
In conclusion, "productviewer" v1.0.0 appears to be built with secure coding practices for the aspects it does implement. Its lack of known vulnerabilities and use of prepared statements are commendable. The primary concern lies in the complete absence of nonce and capability checks, which represents a significant oversight in authorization that could lead to vulnerabilities if the plugin's interaction surface expands or is misconfigured. The absence of identified entry points warrants further investigation to ensure the analysis is comprehensive.
Key Concerns
- Missing nonce checks on potential entry points
- Missing capability checks on potential entry points
ProductViewer Security Vulnerabilities
ProductViewer Code Analysis
Output Escaping
ProductViewer Attack Surface
WordPress Hooks 16
Maintenance & Trust
ProductViewer Maintenance & Trust
Maintenance Signals
Community Trust
ProductViewer Alternatives
Smart Variations Images & Swatches for WooCommerce
smart-variations-images
Boost your WooCommerce sales by adding additional gallery images and swatches to variable products with ease.
QODE Variation Swatches for WooCommerce
qode-variation-swatches-for-woocommerce
QODE Variation Swatches for WooCommerce provides you with a clear-cut way to present shoppers with detailed item variations alongside your products.
Product Variation Swatches for WooCommerce – Smart Swatches
smart-swatches
Appealing color, image, and button variation swatches on your WooCommerce Shop and Product pages in minutes to increase sales.
Variation Swatches for WooCommerce Stores
enweby-variation-swatches-for-woocommerce
The most easy to setup and easy to use variation swatches plugin. It converts boring variation dropdown to beautiful color, image, button/lable, or ra …
Variation Dropdown to Radio Buttons for WooCommerce
gm-variations-radio-buttons-for-woocommerce
Replace the default WooCommerce variation dropdown with radio buttons, switch boxes, or a styled Select2 — boosting conversions and user experience on …
ProductViewer Developer Profile
8 plugins · 10 total installs
How We Detect ProductViewer
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/productviewer/css/adminStyles.css/wp-content/plugins/productviewer/css/frontStyles.css/wp-content/plugins/productviewer/js/viewerAdmin.js/wp-content/plugins/productviewer/js/viewerFront.js/wp-content/plugins/productviewer/three/controls.js/wp-content/plugins/productviewer/three/fbx.js/wp-content/plugins/productviewer/three/glb.js/wp-content/plugins/productviewer/three/three.js+1 more/wp-content/plugins/productviewer/js/viewerAdmin.js/wp-content/plugins/productviewer/js/viewerFront.js/wp-content/plugins/productviewer/three/controls.js/wp-content/plugins/productviewer/three/fbx.js/wp-content/plugins/productviewer/three/glb.js/wp-content/plugins/productviewer/three/three.js+1 moreproductviewer/css/adminStyles.css?ver=productviewer/css/frontStyles.css?ver=productviewer/js/viewerAdmin.js?ver=productviewer/js/viewerFront.js?ver=productviewer/three/controls.js?ver=productviewer/three/fbx.js?ver=productviewer/three/glb.js?ver=productviewer/three/three.js?ver=productviewer/three/zilb.js?ver=HTML / DOM Fingerprints
model_viewer_product_buttonmodel_viewer_product_containerviewer_canvascredit_viewer_frontmodel_product_viewerdesc_notetutorial_vidmaple_logodata-displaydata-modeldata-inst