Supplier Data Fields for WooCommerce Security & Risk Analysis

wordpress.org/plugins/supplier-data-fields-for-wc

Adds supplier fields to the product data section of each product.

200 active installs v1.0.5 PHP + WP 5.2+ Updated Jun 29, 2024
customdatafieldssupplierwoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Supplier Data Fields for WooCommerce Safe to Use in 2026?

Generally Safe

Score 92/100

Supplier Data Fields for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "supplier-data-fields-for-wc" plugin v1.0.5 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of identified attack surface points like AJAX handlers, REST API routes, shortcodes, or cron events, coupled with zero identified flows in taint analysis, suggests a minimal attack vector. Furthermore, the complete lack of historical CVEs, both critical and high, indicates a well-maintained and secure plugin over its lifecycle.

However, a significant concern lies in the output escaping. With 88 total outputs and only 32% properly escaped, this represents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Although the plugin has a nonce check and a capability check, and all SQL queries use prepared statements, the widespread lack of output sanitization leaves users vulnerable to malicious script injection if any user-supplied or dynamic data is outputted without proper escaping.

In conclusion, while the plugin demonstrates excellent practices in terms of attack surface minimization, SQL security, and historical vulnerability management, the poor output escaping is a critical weakness that needs immediate attention. This flaw significantly overshadows the otherwise positive security indicators and requires remediation.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Supplier Data Fields for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Supplier Data Fields for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
60
28 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

32% escaped88 total outputs
Attack Surface

Supplier Data Fields for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterplugin_row_metasupplier-data-fields-for-wc.php:79
actionadmin_menusupplier-data-fields-for-wc.php:90
actionadmin_menusupplier-data-fields-for-wc.php:99
actionwoocommerce_product_options_general_product_datasupplier-data-fields-for-wc.php:208
actionwoocommerce_process_product_metasupplier-data-fields-for-wc.php:286
Maintenance & Trust

Supplier Data Fields for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedJun 29, 2024
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings3
Active installs200
Developer Profile

Supplier Data Fields for WooCommerce Developer Profile

Jeff Sherk

8 plugins · 540 total installs

74
trust score
Avg Security Score
93/100
Avg Patch Time
315 days
View full developer profile
Detection Fingerprints

How We Detect Supplier Data Fields for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/supplier-data-fields-for-wc/dbut-small.png/wp-content/plugins/supplier-data-fields-for-wc/stars-small.png

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Supplier Data Fields for WooCommerce