Storenvy Security & Risk Analysis

wordpress.org/plugins/storenvy

Get and display items from your Storenvy shop

30 active installs v0.4 PHP + WP 3.0+ Updated Dec 20, 2012
storenvy
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Storenvy Safe to Use in 2026?

Generally Safe

Score 85/100

Storenvy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The Storenvy v0.4 plugin exhibits a mixed security posture. On the positive side, it has no known vulnerabilities (CVEs) and uses prepared statements for all its SQL queries, which is a strong indicator of secure database interaction. The absence of dangerous functions, file operations, and bundled libraries also reduces potential attack vectors. However, significant concerns arise from the static analysis. The plugin exposes an AJAX handler without any authentication checks, creating a direct entry point for potential attackers. Furthermore, the taint analysis reveals flows with unsanitized paths, although no critical or high severity issues were flagged. The low percentage of properly escaped output (20%) indicates a risk of cross-site scripting (XSS) vulnerabilities, as user-supplied data is likely being rendered directly into the page without sufficient sanitization. The lack of nonce and capability checks on its entry points further exacerbates these risks, making it easier for unauthenticated or unauthorized users to trigger potentially harmful actions.

Key Concerns

  • AJAX handler without auth check
  • Flows with unsanitized paths
  • Low output escaping percentage
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Storenvy Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Storenvy Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

Output Escaping

20% escaped10 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
get_store_name_cb (storenvy.php:191)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Storenvy Attack Surface

Entry Points2
Unprotected1

AJAX Handlers 1

authwp_ajax_get_store_namestorenvy.php:50

Shortcodes 1

[storenvy] storenvy.php:54
WordPress Hooks 5
actioninitstorenvy.php:48
actionadmin_menustorenvy.php:49
actionadmin_footer-settings_page_storenvy/storenvystorenvy.php:51
actionwp_headstorenvy.php:52
actioncontextual_helpstorenvy.php:53
Maintenance & Trust

Storenvy Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedDec 20, 2012
PHP min version
Downloads4K

Community Trust

Rating80/100
Number of ratings1
Active installs30
Alternatives

Storenvy Alternatives

No alternatives data available yet.

Developer Profile

Storenvy Developer Profile

Kailey (trepmal)

12 plugins · 2K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Storenvy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/storenvy/storenvy.css
Script Paths
/wp-content/plugins/storenvy/storenvy.js
Version Parameters
storenvy/storenvy.css?ver=storenvy/storenvy.js?ver=

HTML / DOM Fingerprints

CSS Classes
se-item
JS Globals
se_storenvyspacerse_idse_namese_descriptionse_short_urlse_price+1 more
Shortcode Output
[storenvy][id][name][description]
FAQ

Frequently Asked Questions about Storenvy