SV WooCommerce Order Export Security & Risk Analysis

wordpress.org/plugins/sv-woocommerce-order-export

Exports WooCommerce Order Data

10 active installs v1.1.2 PHP 5.6+ WP 4.7+ Updated Unknown
order-exportwc-order-exportwoocommercewoocommerce-order-exportwoocommerce-subscriptions-export
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SV WooCommerce Order Export Safe to Use in 2026?

Generally Safe

Score 100/100

SV WooCommerce Order Export has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The sv-woocommerce-order-export plugin v1.1.2 exhibits a generally good security posture with no known historical vulnerabilities. The static analysis reveals a remarkably small attack surface with zero identified entry points that lack authentication or permission checks. Furthermore, the code demonstrates strong output escaping practices, with 92% of outputs being properly escaped, and a commendable 60% of SQL queries utilizing prepared statements. The presence of a nonce check and a capability check are also positive indicators of security awareness.

However, there are significant concerns stemming from the code analysis. The plugin utilizes the `unserialize()` function three times, which is inherently risky as it can lead to Remote Code Execution (RCE) vulnerabilities if untrusted serialized data is passed to it. This is further exacerbated by the taint analysis, which identified two high-severity flows with unsanitized paths. While these are not classified as critical, the potential for these unsanitized paths to interact with `unserialize()` is a serious risk. The lack of any identified CVEs in its history is a strength, suggesting a generally well-maintained codebase, but it does not negate the risks identified in the static and taint analysis.

In conclusion, the plugin has strong foundational security practices in place, particularly regarding its attack surface and output handling. However, the heavy reliance on `unserialize()` and the presence of high-severity unsanitized paths create critical potential vulnerabilities that require immediate attention. Addressing these specific code-level risks would significantly improve the plugin's overall security.

Key Concerns

  • Dangerous function: unserialize() used
  • Taint flow with unsanitized path (high severity)
  • Taint flow with unsanitized path (high severity)
Vulnerabilities
None known

SV WooCommerce Order Export Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

SV WooCommerce Order Export Code Analysis

Dangerous Functions
3
Raw SQL Queries
2
3 prepared
Unescaped Output
1
12 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$new_format = array('fields' => unserialize(get_option('sv_woocommerce_order_export_settings')));sv_woocommerce_order_export.php:55
unserializeupdate_option('sv_woocommerce_order_export_filter',unserialize(get_option('sv_woocommerce_order_exposv_woocommerce_order_export.php:58
unserializeupdate_option('sv_woocommerce_order_export_subscriptions_settings',unserialize(get_option('sv_woocomsv_woocommerce_order_export.php:59

SQL Query Safety

60% prepared5 total queries

Output Escaping

92% escaped13 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
export_get_orders (sv_woocommerce_order_export.php:366)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

SV WooCommerce Order Export Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_initsv_woocommerce_order_export.php:41
actionadmin_menusv_woocommerce_order_export.php:42
actionadmin_enqueue_scriptssv_woocommerce_order_export.php:43
filterplugin_action_linkssv_woocommerce_order_export.php:44
Maintenance & Trust

SV WooCommerce Order Export Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedUnknown
PHP min version5.6
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

SV WooCommerce Order Export Developer Profile

straightvisions GmbH

8 plugins · 2K total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SV WooCommerce Order Export

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sv-woocommerce-order-export/lib/css/style.css/wp-content/plugins/sv-woocommerce-order-export/lib/js/scripts.js
Script Paths
/wp-content/plugins/sv-woocommerce-order-export/lib/js/scripts.js
Version Parameters
sv-woocommerce-order-export/lib/css/style.css?ver=sv-woocommerce-order-export/lib/js/scripts.js?ver=

HTML / DOM Fingerprints

CSS Classes
sv_woocommerce_order_export
HTML Comments
<!-- sv_woocommerce_order_export -->
Data Attributes
data-sv_woocommerce_order_export
JS Globals
sv_woocommerce_order_exportsv_woocommerce_order_export_var
Shortcode Output
[sv_woocommerce_order_export_form][sv_woocommerce_order_export_dashboard_widget]
FAQ

Frequently Asked Questions about SV WooCommerce Order Export