Purchase Order WooCommerce Addon Security & Risk Analysis

wordpress.org/plugins/purchase-order-woocommerce-addon

This plugin adds a purchase order in WooCommerce for customers to complete the order.

100 active installs v1.0 PHP + WP + Updated Aug 20, 2017
purchase-order-payment-gatewaypurchase-order-woocommercewoocommerce-purchase-order
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Purchase Order WooCommerce Addon Safe to Use in 2026?

Generally Safe

Score 85/100

Purchase Order WooCommerce Addon has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The static analysis of "purchase-order-woocommerce-addon" v1.0 indicates a strong initial security posture with no identified direct entry points such as AJAX handlers, REST API routes, or shortcodes. The absence of dangerous functions, file operations, external HTTP requests, and a lack of taint analysis findings further contribute to this positive view. All SQL queries are correctly prepared, which is a significant security strength. However, the static analysis does reveal a concern with output escaping, as only 60% of outputs are properly escaped, leaving potential for cross-site scripting (XSS) vulnerabilities if user-controlled data is outputted without sufficient sanitization. The plugin's vulnerability history is completely clean, with no recorded CVEs, suggesting either a history of secure development or a lack of extensive security auditing. While the lack of entry points and secure SQL practices are commendable, the unescaped output is a notable weakness that requires attention. A more thorough review of output handling is recommended to ensure all user-facing data is properly sanitized.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

Purchase Order WooCommerce Addon Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Purchase Order WooCommerce Addon Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

60% escaped10 total outputs
Attack Surface

Purchase Order WooCommerce Addon Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterwoocommerce_payment_gatewayswoo-purchase-order-addon.php:21
actionwoocommerce_admin_order_data_after_order_detailswoo-purchase-order-addon.php:41
actionwoocommerce_email_after_order_tablewoo-purchase-order-addon.php:42
actionwoocommerce_order_details_after_order_tablewoo-purchase-order-addon.php:43
actionplugins_loadedwoo-purchase-order-addon.php:194
Maintenance & Trust

Purchase Order WooCommerce Addon Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedAug 20, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Alternatives

Purchase Order WooCommerce Addon Alternatives

No alternatives data available yet.

Developer Profile

Purchase Order WooCommerce Addon Developer Profile

syednazrulhassan

10 plugins · 540 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Purchase Order WooCommerce Addon

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/purchase-order-woocommerce-addon/purchase-order-woocommerce-addon.php

HTML / DOM Fingerprints

CSS Classes
form-row-first
Data Attributes
id="po_number_field"name="po_number_field"id="po_note_field"name="po_note_field"
Shortcode Output
<label for="poorder">Purchase Order <span class="required">*</span></label><input type="text" class="input-text" value="" id="po_number_field" name="po_number_field" /><label for="poordernote">Purchase Order Note</label>
FAQ

Frequently Asked Questions about Purchase Order WooCommerce Addon