
Show My Sales Security & Risk Analysis
wordpress.org/plugins/show-my-salesAn E-commerce sales mobile webapp to show live sales data on your iPhone/iPod/Android device. Works with WP e-commerce now, more will be added soon.
Is Show My Sales Safe to Use in 2026?
Generally Safe
Score 85/100Show My Sales has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "show-my-sales" v1.1 plugin presents a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for all its SQL queries, avoiding the risk of SQL injection through raw SQL. Furthermore, the absence of file operations and external HTTP requests limits its attack surface in those areas. The plugin also reports zero known CVEs, which is a strong indicator of past security diligence or a lack of previous exploitation.
However, significant concerns arise from the static analysis. A critical finding is the presence of one taint flow with an unsanitized path, which could lead to a high-severity vulnerability if exploited. Compounding this, a remarkably low percentage (2%) of output is properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities across numerous output points. The complete absence of nonce checks and capability checks, especially given the lack of defined entry points from the static analysis (which is itself unusual for a plugin), is a major oversight that leaves any potential future entry points vulnerable to CSRF and unauthorized actions.
While the vulnerability history is clean, the code analysis reveals inherent weaknesses that could easily lead to future vulnerabilities if not addressed. The plugin's strengths lie in its SQL handling and avoidance of risky external interactions, but the critical taint flow and pervasive output escaping issues are significant security concerns that require immediate attention to improve its overall security. The lack of explicit entry points in the static analysis data is unusual and warrants further investigation, as it might mask potential attack vectors.
Key Concerns
- High severity taint flow found
- Very low output escaping rate (2%)
- Missing nonce checks
- Missing capability checks
Show My Sales Security Vulnerabilities
Show My Sales Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Show My Sales Attack Surface
WordPress Hooks 7
Maintenance & Trust
Show My Sales Maintenance & Trust
Maintenance Signals
Community Trust
Show My Sales Alternatives
WPtouch – Make your WordPress Website Mobile-Friendly
wptouch
With just a few clicks, make your WordPress website mobile-friendly (iPhone, Android, and more). Recommended by Google, it will instantly enable a mob …
AppMySite – WordPress & WooCommerce Mobile App Builder (No-Code Android & iOS App Maker)
appmysite
Turn your WordPress or WooCommerce site into a native Android & iOS app in minutes — no coding required.
WPMobile.App
wpappninja
Android and iOS mobile application. Easy setup, free test.
Browser Theme Color
browser-theme-color
Add the 'theme-color' meta tag to your website for a seamless user experience on Android & iOS with our easy-to-use plugin.
AppPresser – Mobile App Framework
apppresser
Connect your WordPress site to a native mobile app.
Show My Sales Developer Profile
7 plugins · 390 total installs
How We Detect Show My Sales
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/show-my-sales/assets/css/style.css/wp-content/plugins/show-my-sales/assets/js/main.js/wp-content/plugins/show-my-sales/assets/js/main.jsshow-my-sales/assets/css/style.css?ver=show-my-sales/assets/js/main.js?ver=HTML / DOM Fingerprints
var msms_settings[show_my_sales]