surpriseme Security & Risk Analysis

wordpress.org/plugins/surpriseme

surpriseme - die schönste Art, Gutscheine zu schenken! DIE virtuelle Geschenkbox für Deinen Shop. Personalisierbar, interaktiv, Vorfreude garantiert!

10 active installs v1.0.1 PHP + WP 3.0.1+ Updated Mar 20, 2017
geschenkegutscheinewoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is surpriseme Safe to Use in 2026?

Generally Safe

Score 85/100

surpriseme has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "surpriseme" plugin v1.0.1 exhibits a generally good security posture based on the static analysis and vulnerability history. The absence of known CVEs and a clean vulnerability history suggest it has been developed with security in mind, or has been thoroughly vetted. The complete lack of SQL queries without prepared statements and the absence of file operations further bolster its security. However, there are significant areas of concern. The very low percentage of properly escaped output (23%) indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, especially given there are 22 total outputs. The presence of unsanitized paths in 9 out of 9 analyzed taint flows is also a critical red flag, suggesting potential for directory traversal or other file system vulnerabilities if an external HTTP request is involved. The plugin also makes an external HTTP request without any apparent checks or sanitization, which could lead to SSRF or other injection vulnerabilities. Finally, the complete absence of nonce and capability checks across all entry points (though the attack surface is currently zero) means that if any new entry points are added in the future, they will likely be unprotected, posing a future risk.

In conclusion, while the plugin currently has no known historical vulnerabilities and uses prepared statements for SQL, the significant issues with output escaping, unsanitized taint flows, and lack of authorization checks on potential entry points present a considerable risk. The plugin's strengths lie in its SQL practices and clean history, but these are heavily outweighed by the critical flaws identified in the static analysis. Further development should prioritize addressing these output escaping and path sanitization issues, and implementing robust authorization checks for any future entry points.

Key Concerns

  • High percentage of unsanitized paths in taint flows
  • Very low percentage of properly escaped output
  • External HTTP request without apparent checks
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

surpriseme Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

surpriseme Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

23% escaped22 total outputs
Data Flows
9 unsanitized

Data Flow Analysis

9 flows9 with unsanitized paths
add_tab (includes\class-backend.php:210)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

surpriseme Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 15
actionadmin_headincludes\class-backend.php:49
actionadmin_footerincludes\class-backend.php:50
actionadmin_menuincludes\class-backend.php:51
actionadmin_initincludes\class-backend.php:52
actionadmin_noticesincludes\class-backend.php:53
filterwoocommerce_cart_needs_shippingincludes\class-shipping-options.php:34
filterwoocommerce_shipping_methodsincludes\class-shipping-options.php:61
actionwoocommerce_cart_totals_after_shippingincludes\class-shipping-options.php:66
actionwoocommerce_review_order_after_shippingincludes\class-shipping-options.php:67
actionwoocommerce_shipping_initincludes\class-shipping-options.php:263
actionwoocommerce_product_options_general_product_dataincludes\class-shipping-options.php:266
actionwoocommerce_process_product_metaincludes\class-shipping-options.php:267
actionadmin_noticessurpriseme.php:96
actionwoocommerce_thankyousurpriseme.php:102
actionwoocommerce_order_status_completedsurpriseme.php:103
Maintenance & Trust

surpriseme Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedMar 20, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

surpriseme Developer Profile

surpriseme

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect surpriseme

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/surpriseme/assets/css/surpriseme-admin.css/wp-content/plugins/surpriseme/assets/css/surpriseme-front.css/wp-content/plugins/surpriseme/assets/js/surpriseme-admin.js/wp-content/plugins/surpriseme/assets/js/surpriseme-front.js
Script Paths
/wp-content/plugins/surpriseme/assets/js/surpriseme-admin.js/wp-content/plugins/surpriseme/assets/js/surpriseme-front.js
Version Parameters
surpriseme/assets/css/surpriseme-admin.css?ver=surpriseme/assets/css/surpriseme-front.css?ver=surpriseme/assets/js/surpriseme-admin.js?ver=surpriseme/assets/js/surpriseme-front.js?ver=

HTML / DOM Fingerprints

CSS Classes
surpriseme_settings_groupsurpriseme_shipping_options
HTML Comments
Copyright: go4seven GmbH http://www.surpriseme.com
Data Attributes
data-option_valuedata-option_name
JS Globals
surprisemeSurprisemeMain
FAQ

Frequently Asked Questions about surpriseme