
Supplier Order Email Security & Risk Analysis
wordpress.org/plugins/supplier-order-emailSends an automatic order emails to the suppliers to send the corresponding products to the customer.
Is Supplier Order Email Safe to Use in 2026?
Generally Safe
Score 100/100Supplier Order Email has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "supplier-order-email" plugin v3.6.15 exhibits a mixed security posture. On the positive side, the plugin has a remarkably small attack surface with zero identified entry points that lack authentication or permission checks. This suggests a good understanding of WordPress security best practices regarding direct user interaction vectors. The plugin also demonstrates a relatively strong output escaping rate and includes nonce and capability checks in its code.
However, significant concerns arise from the handling of SQL queries. With 12 total SQL queries and 0% utilizing prepared statements, the plugin is highly susceptible to SQL injection vulnerabilities. Furthermore, the taint analysis reveals two flows with unsanitized paths, indicating potential risks even if no critical or high-severity issues were flagged in this specific analysis. The presence of the "dompdf" library is also noted; while not inherently a vulnerability, bundled libraries can become a risk if not actively maintained and updated, as they can contain their own vulnerabilities.
Critically, the plugin's vulnerability history is spotless, with zero known CVEs. This is a very positive sign, suggesting a history of stable and secure development. However, this lack of history does not negate the clear risks identified in the static and taint analysis. The absence of vulnerabilities could be due to a lack of past targeted analysis or simply good luck, rather than inherent security. Therefore, while the plugin benefits from a clean history and a protected attack surface, the widespread lack of prepared statements in SQL queries and the identified unsanitized paths present a substantial risk that requires immediate attention.
Key Concerns
- Raw SQL queries without prepared statements
- Taint flows with unsanitized paths
- Bundled library (dompdf)
Supplier Order Email Security Vulnerabilities
Supplier Order Email Code Analysis
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
Supplier Order Email Attack Surface
WordPress Hooks 39
Maintenance & Trust
Supplier Order Email Maintenance & Trust
Maintenance Signals
Community Trust
Supplier Order Email Alternatives
Email Orders Digest
woo-email-orders
Sends out a daily email digest of all orders made the previous day in WooCommerce
CC Email Manager for WooCommerce
aisp-cc-email-manager
Add CC (carbon copy) emails per customer and automatically send WooCommerce notifications to additional recipients based on selected order statuses.
Email Design Studio
email-design-studio
create and customize powerful email design and templates for your customers.
HoneyBadger.IT
honeybadger-it
WC Order Management System including custom order statuses, emails, attachments, split orders, combine orders, variant image gallery, PDF Invoices, ma …
ATUM WooCommerce Inventory Management and Stock Tracking
atum-stock-manager-for-woocommerce
WooCommerce Full Inventory Management, Purchase Orders, Suppliers, Inbound Stock, Inventory Logs, WooCommerce Sales Statistics, and More.
Supplier Order Email Developer Profile
4 plugins · 500 total installs
How We Detect Supplier Order Email
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/supplier-order-email/admin/css/mcisoe_style.css/wp-content/plugins/supplier-order-email/admin/css/mcisoe_help.css/wp-content/plugins/supplier-order-email/admin/js/mcisoe_script.js/wp-content/plugins/supplier-order-email/admin/js/mcisoe_script.jssupplier-order-email/admin/js/mcisoe_script.js?ver=HTML / DOM Fingerprints
mcisoe_notice_btn