Shopper Rewards for WP-eCommerce Security & Risk Analysis

wordpress.org/plugins/shopper-rewards-free-for-wp-ecommerce

Let your shoppers earn points for purchasing from your WP e-Commerce store.

10 active installs v2013.07.15.1 PHP + WP 3.5+ Updated Jul 22, 2013
pointsrewardsshoppingstorewp-ecommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Shopper Rewards for WP-eCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

Shopper Rewards for WP-eCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "shopper-rewards-free-for-wp-ecommerce" plugin version 2013.07.15.1 exhibits a concerning security posture despite some positive code practices. While it shows a high percentage of prepared SQL statements and proper output escaping, critical weaknesses exist. Notably, all identified entry points, including AJAX handlers, lack authentication checks. The taint analysis reveals a significant number of flows with unsanitized paths, including three classified as high severity. This combination of an exposed attack surface and potential for unsanitized data processing points to a high risk of exploitation.

The plugin's vulnerability history is clean, with no recorded CVEs. This could indicate either a lack of past vulnerabilities or a lack of discovery and reporting. However, the current code analysis presents immediate and actionable risks that should not be overlooked based solely on past history. The absence of nonce checks and capability checks on the identified AJAX endpoints further exacerbates the risk, making it easier for unauthenticated users to trigger potentially harmful actions.

In conclusion, while the plugin demonstrates good practices in SQL query preparation and output escaping, these strengths are overshadowed by severe deficiencies in authentication and data sanitization for its entry points. The high number of unsanitized taint flows and unprotected AJAX handlers presents a substantial security risk that requires immediate attention.

Key Concerns

  • AJAX handlers without authentication checks
  • High severity unsanitized taint flows (3)
  • All entry points unprotected
  • No nonce checks
  • No capability checks
  • 13 flows with unsanitized paths
Vulnerabilities
None known

Shopper Rewards for WP-eCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Shopper Rewards for WP-eCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
17 prepared
Unescaped Output
42
154 escaped
Nonce Checks
0
Capability Checks
0
File Operations
8
External Requests
1
Bundled Libraries
0

SQL Query Safety

94% prepared18 total queries

Output Escaping

79% escaped196 total outputs
Data Flows
13 unsanitized

Data Flow Analysis

13 flows13 with unsanitized paths
process_bulk_action (core\list-details.php:251)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Shopper Rewards for WP-eCommerce Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_pbci_dismiss_messagepbci-product-manager-client.class.php:895
noprivwp_ajax_pbci_dismiss_messagepbci-product-manager-client.class.php:899
WordPress Hooks 18
actionadmin_menucore\admin.php:105
filterauthenticatecore\loginbyemail.php:58
filterwpsc_transaction_result_reportcore\receipt.php:67
filterwpsc_transaction_result_messagecore\receipt.php:68
filterwpsc_transaction_result_message_htmlcore\receipt.php:69
actionadmin_noticescore\status.php:219
actionwp_enqueue_scriptscore\style.php:75
actionadmin_headcore\style.php:83
filterwpsc_user_profile_tabscore\userprofile.php:69
actionwpsc_default_user_profile_tabcore\userprofile.php:75
actionwpsc_user_profile_section_redeemcore\userprofile.php:85
actionwpsc_user_profile_section_pointscore\userprofile.php:99
actionwpsc_user_profile_section_couponcore\userprofile.php:108
filterwpsc_purchase_log_notification_html_argscore\wpsc-hooks-and-filters.php:72
actionwpsc_update_purchase_log_statuscore\wpsc-hooks-and-filters.php:80
actionadmin_noticespbci-product-manager-client.class.php:891
actionadmin_menupbci-product-manager-client.class.php:902
actionafter_setup_themepbci-shopper-rewards-for-wpec.php:114
Maintenance & Trust

Shopper Rewards for WP-eCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedJul 22, 2013
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Shopper Rewards for WP-eCommerce Developer Profile

Jeffrey Schutzman

4 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Shopper Rewards for WP-eCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/shopper-rewards-free-for-wp-ecommerce/css/style.css
Version Parameters
shopper-rewards-free-for-wp-ecommerce/css/style.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Shopper Rewards for WP-eCommerce