PW WooCommerce BOGO Security & Risk Analysis

wordpress.org/plugins/pw-woocommerce-bogo-free

PW WooCommerce BOGO Free makes Buy One, Get One promotions so easy!

400 active installs v3.8 PHP 7.4+ WP 4.5+ Updated Mar 15, 2026
bogobuy-one-get-onediscountsalewoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PW WooCommerce BOGO Safe to Use in 2026?

Generally Safe

Score 100/100

PW WooCommerce BOGO has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 19d ago
Risk Assessment

The "pw-woocommerce-bogo-free" plugin version 3.8 exhibits a strong security posture based on the provided static analysis. The plugin demonstrates good practices by having no identifiable entry points such as AJAX handlers, REST API routes, shortcodes, or cron events that are accessible without authentication or proper permission checks. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests further strengthens its defensive capabilities. The code signals also show a positive inclination towards security, with a capability check present and a low percentage of unescaped output, indicating efforts to mitigate common web vulnerabilities.

However, a significant concern arises from the sole SQL query being executed without the use of prepared statements. This is a critical vulnerability that could expose the application to SQL injection attacks, especially if the data used in the query originates from user input without proper sanitization or validation. While the taint analysis shows no unsanitized paths, the presence of a raw SQL query without preparation remains a direct risk. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive indicator of its historical security. Nevertheless, the absence of past vulnerabilities does not negate the immediate risk presented by the raw SQL query.

In conclusion, the plugin has a commendable foundation in security by minimizing its attack surface and implementing some security checks. The lack of known vulnerabilities is encouraging. The primary weakness and the most critical risk identified is the unescaped SQL query, which requires immediate attention. Addressing this specific issue would significantly improve the plugin's overall security and bring it closer to a truly secure state.

Key Concerns

  • Raw SQL query without prepared statements
  • Unescaped output present
Vulnerabilities
None known

PW WooCommerce BOGO Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

PW WooCommerce BOGO Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
3
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

40% escaped5 total outputs
Attack Surface

PW WooCommerce BOGO Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 23
actionplugins_loadedpw-woocommerce-bogo-free.php:52
actionwoocommerce_initpw-woocommerce-bogo-free.php:53
actionbefore_woocommerce_initpw-woocommerce-bogo-free.php:56
actioninitpw-woocommerce-bogo-free.php:76
actionadmin_menupw-woocommerce-bogo-free.php:79
actionadmin_enqueue_scriptspw-woocommerce-bogo-free.php:80
filtermanage_edit-pw_bogo_columnspw-woocommerce-bogo-free.php:81
actionadd_meta_boxes_pw_bogopw-woocommerce-bogo-free.php:82
actionpre_get_postspw-woocommerce-bogo-free.php:83
filterwp_count_postspw-woocommerce-bogo-free.php:84
filterwoocommerce_order_get_itemspw-woocommerce-bogo-free.php:85
actionwoocommerce_after_calculate_totalspw-woocommerce-bogo-free.php:88
filterwoocommerce_get_shop_coupon_datapw-woocommerce-bogo-free.php:91
actionwoocommerce_add_to_cartpw-woocommerce-bogo-free.php:92
actionwoocommerce_check_cart_itemspw-woocommerce-bogo-free.php:93
filterwoocommerce_coupon_messagepw-woocommerce-bogo-free.php:94
filterwoocommerce_coupon_is_validpw-woocommerce-bogo-free.php:95
filterwoocommerce_cart_totals_coupon_labelpw-woocommerce-bogo-free.php:96
actionwoocommerce_new_order_itempw-woocommerce-bogo-free.php:99
actionwoocommerce_order_add_couponpw-woocommerce-bogo-free.php:101
actionwoocommerce_cart_calculate_feespw-woocommerce-bogo-free.php:104
actionwoocommerce_cart_contents_totalpw-woocommerce-bogo-free.php:105
actionwoocommerce_after_calculate_totalspw-woocommerce-bogo-free.php:470
Maintenance & Trust

PW WooCommerce BOGO Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 15, 2026
PHP min version7.4
Downloads49K

Community Trust

Rating82/100
Number of ratings50
Active installs400
Developer Profile

PW WooCommerce BOGO Developer Profile

pimwick

9 plugins · 43K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
9 days
View full developer profile
Detection Fingerprints

How We Detect PW WooCommerce BOGO

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pw-woocommerce-bogo-free/js/pw_bogo_admin.js/wp-content/plugins/pw-woocommerce-bogo-free/css/pw_bogo_admin.css
Version Parameters
pw-woocommerce-bogo-free/js/pw_bogo_admin.js?ver=pw-woocommerce-bogo-free/css/pw_bogo_admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
pw_bogo_meta_box
HTML Comments
<!-- PW BOGO Meta Box Start --><!-- PW BOGO Meta Box End -->
Data Attributes
data-pw-bogo-id
JS Globals
pw_bogo_settings
FAQ

Frequently Asked Questions about PW WooCommerce BOGO