Simple ParsPal Shopping Cart Security & Risk Analysis

wordpress.org/plugins/simple-parspal-shopping-cart

Very easy to use Simple WordPress ParsPal Shopping Cart Plugin. Great for selling products online in one click from your WordPress site.

10 active installs vv1.0.0 PHP + WP 2.6+ Updated Apr 23, 2013
online-shopparspal-shopping-cartshopping-cartwordperss-ecommercewordpress-shopping-cart
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Simple ParsPal Shopping Cart Safe to Use in 2026?

Generally Safe

Score 85/100

Simple ParsPal Shopping Cart has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The static analysis of the 'simple-parspal-shopping-cart' plugin version 1.0.0 reveals a mixed security posture. On the positive side, the plugin demonstrates good practices by avoiding dangerous functions, file operations, and external HTTP requests. Crucially, all detected SQL queries utilize prepared statements, and there are no known vulnerabilities in its history, suggesting a generally stable and well-maintained codebase regarding known exploits.

However, significant concerns arise from the output escaping and taint analysis. A striking 100% of outputs are not properly escaped, presenting a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis identified two flows with unsanitized paths, indicating potential issues where user-supplied data might be improperly handled, even though these did not reach a critical or high severity in this specific analysis. The absence of nonce checks and capability checks for its entry points, while not immediately exploited in the static analysis, leaves the plugin vulnerable to various attacks if an attacker can trigger its shortcodes in an unauthorized manner.

In conclusion, while the plugin shows strengths in secure SQL handling and a clean vulnerability history, the prevalent lack of output escaping and the presence of unsanitized taint flows are substantial weaknesses that require immediate attention. The absence of robust authentication and authorization mechanisms on its entry points exacerbates these risks, creating a potential attack vector for XSS and other injection-based vulnerabilities. Addressing the output escaping is paramount to securing this plugin.

Key Concerns

  • Outputs are not properly escaped
  • Flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Simple ParsPal Shopping Cart Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Simple ParsPal Shopping Cart Release Timeline

v1.0.0
Code Analysis
Analyzed Mar 17, 2026

Simple ParsPal Shopping Cart Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
show_wp_cart_options_page (wp_shopping_cart.php:488)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Simple ParsPal Shopping Cart Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[show_wp_shopping_cart] wp_shopping_cart.php:705
[always_show_wp_shopping_cart] wp_shopping_cart.php:707
WordPress Hooks 7
actionadmin_menuwp_shopping_cart.php:698
actioninitwp_shopping_cart.php:699
filterwidget_textwp_shopping_cart.php:701
filterthe_contentwp_shopping_cart.php:702
filterthe_contentwp_shopping_cart.php:703
actionwp_headwp_shopping_cart.php:709
actionwp_headwp_shopping_cart.php:710
Maintenance & Trust

Simple ParsPal Shopping Cart Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedApr 23, 2013
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Simple ParsPal Shopping Cart Developer Profile

mobinco

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple ParsPal Shopping Cart

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-parspal-shopping-cart/images/shopping_cart_icon.png/wp-content/plugins/simple-parspal-shopping-cart/images/Shoppingcart_delete.png
Version Parameters
simple-parspal-shopping-cart/wp_shopping_cart.php?ver=

HTML / DOM Fingerprints

CSS Classes
shopping_cart
HTML Comments
show-wp-shopping-cart
Data Attributes
data-product-namedata-product-pricedata-product-quantity
JS Globals
window.simpleCart
Shortcode Output
<input type='image' src=' alt='Cart' /><input type='image' src=' alt='Remove' />
FAQ

Frequently Asked Questions about Simple ParsPal Shopping Cart