Sözleşmeler Security & Risk Analysis

wordpress.org/plugins/sozlesmeler

WordPress plugin to add legal documents like distance sales agreement to your WooCommerce store.

1K active installs v2.7.0 PHP 7.4+ WP 5.0+ Updated Jan 12, 2025
contractsozlesmesozlesmelerwoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Sözleşmeler Safe to Use in 2026?

Generally Safe

Score 92/100

Sözleşmeler has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "sozlesmeler" v2.7.0 plugin demonstrates a generally strong security posture based on the provided static analysis. It exhibits zero known vulnerabilities in its history, which is a significant positive indicator. Furthermore, the code analysis reveals a clean codebase with no dangerous functions, no file operations, no external HTTP requests, and all SQL queries utilizing prepared statements. The output escaping is also well-handled, with 87% of outputs properly escaped, minimizing the risk of cross-site scripting (XSS) vulnerabilities. The presence of nonce checks on some functions is also a good practice.

Despite these strengths, there are a few areas that prevent a perfect score. The complete absence of capability checks is a notable concern. While there are no reported AJAX handlers or REST API routes without authentication, the lack of capability checks on any potential entry points means that even if authentication is present, authorization might not be granularly enforced, potentially allowing unauthorized users to trigger unintended actions if other vulnerabilities were present or introduced later. The fact that there are no uncovered entry points (AJAX, REST API, shortcodes, cron) is excellent, suggesting a limited attack surface. However, the absence of capability checks on the existing nonce checks means that these protections are not as robust as they could be.

Overall, the plugin is well-coded and has a strong track record, indicating responsible development. The primary weakness lies in the absence of capability checks, which, while not presenting an immediate exploitable vulnerability based on this analysis, is a fundamental security control that should ideally be present to ensure robust authorization. The current score reflects its strong technical implementation and clean history but accounts for this missed security best practice.

Key Concerns

  • Missing capability checks
  • High percentage of properly escaped output
  • All SQL queries use prepared statements
  • No dangerous functions
  • No file operations
  • No external HTTP requests
  • No unprotected AJAX handlers
  • No unprotected REST API routes
  • No shortcodes
  • No cron events
  • No known CVEs
  • No taint analysis findings
Vulnerabilities
None known

Sözleşmeler Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Sözleşmeler Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
62 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

87% escaped71 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
woocontracts_admin_panel (woocontracts.php:485)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Sözleşmeler Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
actionwp_enqueue_scriptswoocontracts.php:93
actionadmin_enqueue_scriptswoocontracts.php:104
actionwoocommerce_checkout_terms_and_conditionswoocontracts.php:213
filterwoocommerce_checkout_fieldswoocontracts.php:241
filterwoocommerce_admin_order_preview_get_order_detailswoocontracts.php:256
actionwoocommerce_admin_order_preview_startwoocontracts.php:264
actionwoocommerce_admin_order_data_after_billing_addresswoocontracts.php:278
actionwoocommerce_process_shop_order_metawoocontracts.php:294
actionwoocommerce_checkout_after_terms_and_conditionswoocontracts.php:303
actionwoocommerce_checkout_processwoocontracts.php:321
actionwoocommerce_email_customer_detailswoocontracts.php:443
actionadmin_menuwoocontracts.php:449
actionadmin_noticeswoocontracts.php:779
actionbefore_woocommerce_initwoocontracts.php:781
Maintenance & Trust

Sözleşmeler Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJan 12, 2025
PHP min version7.4
Downloads26K

Community Trust

Rating98/100
Number of ratings21
Active installs1K
Developer Profile

Sözleşmeler Developer Profile

emreguler

2 plugins · 1K total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Sözleşmeler

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sozlesmeler/css/stil.css/wp-content/plugins/sozlesmeler/js/woocontracts.js/wp-content/plugins/sozlesmeler/js/woocontractsadmin.js/wp-content/plugins/sozlesmeler/js/notify.min.js/wp-content/plugins/sozlesmeler/css/adminstil.css
Script Paths
/wp-content/plugins/sozlesmeler/js/woocontracts.js/wp-content/plugins/sozlesmeler/js/woocontractsadmin.js/wp-content/plugins/sozlesmeler/js/notify.min.js
Version Parameters
sozlesmeler/js/woocontracts.js?ver=sozlesmeler/js/woocontractsadmin.js?ver=sozlesmeler/js/notify.min.js?ver=sozlesmeler/css/stil.css?ver=sozlesmeler/css/adminstil.css?ver=

HTML / DOM Fingerprints

CSS Classes
musteriadmusterisoyadmusterifirmamusteriadres1musteriadres2musteripostamusteriilcemusteriil+15 more
Data Attributes
id="woocontracts-tab-content"id="woocontracts-settings"
JS Globals
WCTR_VER
Shortcode Output
[fatura-isim][fatura-firma][fatura-adres][tc-kimlik-no]
FAQ

Frequently Asked Questions about Sözleşmeler