Redirect Purchase to Chat for Woo Security & Risk Analysis

wordpress.org/plugins/redirect-purchase-to-chat-for-woo

Redirect the WooCommerce "Buy Now" button to a custom chat link or phone number with a pre-filled message. Developed by Mutt Group / Mutt Studio.

10 active installs v1.3 PHP 8.0+ WP 6.0+ Updated Dec 11, 2025
buy-buttonchatredirectwhatsappwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Redirect Purchase to Chat for Woo Safe to Use in 2026?

Generally Safe

Score 100/100

Redirect Purchase to Chat for Woo has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The static analysis of "redirect-purchase-to-chat-for-woo" v1.3 reveals an exceptionally clean code base with no identified attack surface points, dangerous functions, SQL injection vulnerabilities, file operations, external HTTP requests, or taint analysis issues. This indicates strong adherence to secure coding practices in these specific areas. The absence of known CVEs in its vulnerability history further suggests a mature and well-maintained plugin. However, the complete lack of nonce and capability checks across all identified entry points (even though there are none) is a significant concern. While the current data shows no exploitable entry points, any future additions or modifications to the plugin without implementing these fundamental security checks would immediately introduce critical vulnerabilities. This pattern highlights a potential blind spot in the developer's security awareness, focusing on preventing immediate issues but potentially overlooking foundational security mechanisms.

Key Concerns

  • No nonce checks found
  • No capability checks found
  • Minor unescaped output
Vulnerabilities
None known

Redirect Purchase to Chat for Woo Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Redirect Purchase to Chat for Woo Release Timeline

v1.3Current
Code Analysis
Analyzed Mar 16, 2026

Redirect Purchase to Chat for Woo Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

75% escaped4 total outputs
Attack Surface

Redirect Purchase to Chat for Woo Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuredirect-purchase-to-chat-for-woo.php:25
actionadmin_initredirect-purchase-to-chat-for-woo.php:54
filterwoocommerce_product_single_add_to_cart_textredirect-purchase-to-chat-for-woo.php:94
actionwp_enqueue_scriptsredirect-purchase-to-chat-for-woo.php:104
Maintenance & Trust

Redirect Purchase to Chat for Woo Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 11, 2025
PHP min version8.0
Downloads379

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Redirect Purchase to Chat for Woo Developer Profile

Mutt Group / Mutt Studio

5 plugins · 20 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Redirect Purchase to Chat for Woo

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
redirect-purchase-to-chat-for-woo.php?ver=1.3

HTML / DOM Fingerprints

CSS Classes
wrap
JS Globals
RPWPP_VERSION
FAQ

Frequently Asked Questions about Redirect Purchase to Chat for Woo