Subscription Paid Reactivation Security & Risk Analysis

wordpress.org/plugins/subscription-paid-reactivation

Charge a one-time reactivation fee when customers reactivate cancelled WooCommerce subscriptions.

0 active installs v1.0.2 PHP 7.0+ WP 5.0+ Updated Jan 21, 2026
cancelled-subscriptionsreactivate-subscriptionreactivationsubscription-feewoocommerce-subscriptions
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Subscription Paid Reactivation Safe to Use in 2026?

Generally Safe

Score 100/100

Subscription Paid Reactivation has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

Based on the provided static analysis, the "subscription-paid-reactivation" plugin v1.0.2 exhibits an excellent security posture. There are no identified attack vectors such as AJAX handlers, REST API routes, shortcodes, or cron events that could be exploited. Furthermore, the code demonstrates strong security practices by avoiding dangerous functions, using prepared statements for all SQL queries, and properly escaping all output. The absence of file operations, external HTTP requests, nonce checks, and capability checks in the analyzed code also contributes to a minimal attack surface.

The plugin's vulnerability history is also completely clear, with no known CVEs or past vulnerabilities recorded. This suggests a well-maintained and secure codebase. The taint analysis further supports this, showing zero flows with unsanitized paths. The complete lack of identified issues across all analysis categories points to a plugin that has been developed with security as a high priority and appears to be free from common vulnerabilities.

In conclusion, the "subscription-paid-reactivation" plugin v1.0.2 presents a very low security risk. The code analysis reveals a robust implementation with no discernible vulnerabilities or exploitable entry points. The clean vulnerability history reinforces this assessment. The plugin demonstrates significant strengths in secure coding practices, making it a highly secure option.

Vulnerabilities
None known

Subscription Paid Reactivation Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Subscription Paid Reactivation Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Subscription Paid Reactivation Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionplugins_loadedsubscription-paid-reactivation.php:64
actionbefore_woocommerce_initsubscription-paid-reactivation.php:67
Maintenance & Trust

Subscription Paid Reactivation Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 21, 2026
PHP min version7.0
Downloads81

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Subscription Paid Reactivation Developer Profile

Utsav tilava

3 plugins · 110 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Subscription Paid Reactivation

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Subscription Paid Reactivation