Store Manager Security & Risk Analysis

wordpress.org/plugins/store-manager

Store manager with control over opening hours, location, images and much more.

10 active installs v1.0.2.2 PHP + WP 4.0+ Updated Mar 19, 2016
custom-postdistancelocationradiusstore
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Store Manager Safe to Use in 2026?

Generally Safe

Score 85/100

Store Manager has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "store-manager" v1.0.2.2 plugin exhibits several concerning security practices, despite a clean vulnerability history. A significant portion of its attack surface, specifically two AJAX handlers, lacks proper authentication checks. This creates direct entry points for attackers to potentially exploit the plugin's functionality without authorization. Furthermore, the plugin relies heavily on direct SQL queries, with none utilizing prepared statements. This is a critical oversight that exposes the application to SQL injection vulnerabilities. The low percentage of properly escaped output (4%) is also a major concern, indicating a high risk of cross-site scripting (XSS) attacks.

The taint analysis reveals two flows with unsanitized paths, which, while not classified as critical or high, still represent potential security weaknesses that could be leveraged for unauthorized actions or data manipulation. The absence of any recorded CVEs is positive, but it should not be seen as an indicator of perfect security, especially given the widespread vulnerabilities found in the code analysis.

Overall, the plugin's security posture is weak due to a large number of unprotected entry points, the absence of prepared statements for all SQL queries, and poor output escaping. While the lack of a vulnerability history is a strength, it is overshadowed by the clear and present risks identified in the static analysis. Developers should prioritize addressing the SQL injection and XSS risks, as well as implementing proper authentication and authorization checks on all AJAX endpoints.

Key Concerns

  • AJAX handlers without auth checks
  • SQL queries not using prepared statements
  • Low percentage of properly escaped output
  • Taint flows with unsanitized paths
  • Missing nonce checks on AJAX
Vulnerabilities
None known

Store Manager Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Store Manager Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Store Manager Code Analysis

Dangerous Functions
0
Raw SQL Queries
5
0 prepared
Unescaped Output
66
3 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

0% prepared5 total queries

Output Escaping

4% escaped69 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
get_supplier_options (includes\class-store-manager.php:718)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Store Manager Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

authwp_ajax_sm_get_ll_by_qstore-manager.php:31
authwp_ajax_sm_get_supplier_optionsstore-manager.php:32

Shortcodes 1

[store-manager-form] store-manager.php:34
WordPress Hooks 7
actionadmin_footerincludes\class-store-manager.php:203
actioninitstore-manager.php:20
actionadmin_menustore-manager.php:25
actionadmin_print_scriptsstore-manager.php:26
actionadmin_print_stylesstore-manager.php:27
actionsave_poststore-manager.php:29
filtersingle_templatestore-manager.php:36
Maintenance & Trust

Store Manager Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedMar 19, 2016
PHP min version
Downloads2K

Community Trust

Rating80/100
Number of ratings1
Active installs10
Developer Profile

Store Manager Developer Profile

dirlikdesigns

3 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Store Manager

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/store-manager/css/store-manager.css/wp-content/plugins/store-manager/js/store-manager.js
Script Paths
/wp-content/plugins/store-manager/js/store-manager.js
Version Parameters
store-manager/css/store-manager.css?ver=store-manager/js/store-manager.js?ver=

HTML / DOM Fingerprints

CSS Classes
sm-options
Data Attributes
data-sm-option-group
Shortcode Output
[store-manager-form]
FAQ

Frequently Asked Questions about Store Manager