PRyC WP/WooCommerce: Catalog Mode Security & Risk Analysis

wordpress.org/plugins/pryc-wp-woocommerce-catalog-mode

For WooCommerce plugin - hide "add to cart" button and price (single product and product list/archive).

50 active installs v1.1.6 PHP + WP 3.0.1+ Updated Apr 15, 2024
ecommerceshopwcwoocommercewordpress
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PRyC WP/WooCommerce: Catalog Mode Safe to Use in 2026?

Generally Safe

Score 92/100

PRyC WP/WooCommerce: Catalog Mode has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The static analysis of pryc-wp-woocommerce-catalog-mode v1.1.6 reveals a strong security posture based on the provided metrics. The absence of any detected dangerous functions, unsanitized taint flows, raw SQL queries, file operations, or external HTTP requests is a significant positive indicator. Furthermore, the lack of any recorded vulnerabilities in its history suggests a well-maintained and secure plugin. The audit indicates a commitment to secure coding practices, particularly in how it handles data and interactions.

However, the analysis also highlights a complete absence of security controls such as nonce checks and capability checks. While the current attack surface is reported as zero, meaning no direct entry points were identified without authentication, this lack of explicit checks is a potential concern. If future updates introduce new features or inadvertently expose entry points, the absence of these fundamental security mechanisms could become a critical weakness. The plugin's current security is commendable, but the reliance on a static, seemingly closed attack surface without explicit protective measures warrants careful monitoring.

In conclusion, pryc-wp-woocommerce-catalog-mode v1.1.6 appears to be a secure plugin, evidenced by its clean static analysis and unblemished vulnerability history. The developer has adhered to good coding practices by avoiding dangerous functions and properly handling SQL. The primary area for improvement, or at least increased scrutiny, is the absence of nonce and capability checks, which, while not currently exploitable due to the zero attack surface, represent a gap in defensive programming that could become significant if the plugin evolves.

Key Concerns

  • No Nonce checks detected
  • No Capability checks detected
Vulnerabilities
None known

PRyC WP/WooCommerce: Catalog Mode Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

PRyC WP/WooCommerce: Catalog Mode Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

PRyC WP/WooCommerce: Catalog Mode Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitpryc-wp-woocommerce-catalog-mode.php:17
filterwoocommerce_is_purchasablepryc-wp-woocommerce-catalog-mode.php:39
Maintenance & Trust

PRyC WP/WooCommerce: Catalog Mode Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedApr 15, 2024
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs50
Developer Profile

PRyC WP/WooCommerce: Catalog Mode Developer Profile

Patryk

18 plugins · 4K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PRyC WP/WooCommerce: Catalog Mode

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about PRyC WP/WooCommerce: Catalog Mode