
Trade Runner Security & Risk Analysis
wordpress.org/plugins/traderunnerWooCommerce to Trade Me integration.
Is Trade Runner Safe to Use in 2026?
Use With Caution
Score 66/100Trade Runner has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The "traderunner" v3.14 plugin exhibits a mixed security posture. On one hand, the static analysis reveals excellent adherence to secure coding practices within its current version. The absence of any dangerous functions, properly escaped output, secure handling of SQL queries with prepared statements, and a lack of file operations or external HTTP requests are all positive indicators. Furthermore, the attack surface appears minimal, with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without authentication or proper checks.
However, the plugin's vulnerability history presents significant concerns. With a total of 3 known CVEs, and notably one that remains unpatched, there is a clear track record of security flaws. The common vulnerability types identified, Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS), are serious issues that can lead to unauthorized actions and data compromise. The fact that the last vulnerability was identified in November 2025 (though this is in the future and likely a data entry error, it still indicates recent past issues) suggests that the plugin has historically struggled with security.
While the current version of the code demonstrates good development practices, the past vulnerability record, especially the unpatched CVE, poses a substantial risk. Users should be aware that despite apparent good coding in v3.14, the plugin has a history of significant vulnerabilities. The lack of nonces and capabilities checks on some entry points (though the analysis shows 0 unprotected entry points, the presence of capability checks at all suggests there might be areas that could benefit from stricter access control, though the static analysis does not highlight this as a direct risk in v3.14) is less of a concern given the lack of exposed entry points, but the unpatched CVE is a critical outstanding issue.
Key Concerns
- Unpatched CVEs
- History of medium severity vulnerabilities
- Vulnerabilities: CSRF and XSS
Trade Runner Security Vulnerabilities
CVEs by Year
Severity Breakdown
3 total CVEs
Trade Runner <= 3.14 - Cross-Site Request Forgery
Trade Runner <= 3.9 - Authenticated (Admin+) Stored Cross-Site Scripting
Trade Runner <= 3.9 - Cross-Site Scripting
Trade Runner Code Analysis
SQL Query Safety
Output Escaping
Trade Runner Attack Surface
WordPress Hooks 5
Maintenance & Trust
Trade Runner Maintenance & Trust
Maintenance Signals
Community Trust
Trade Runner Alternatives
Essential Addons for Elementor – Popular Elementor Templates & Widgets
essential-addons-for-elementor-lite
Elementor addon offering 110+ widgets and templates — Elementor Gallery, Slider, Form, Post Grid, Menu, Accordion, WooCommerce & more.
Google for WooCommerce
google-listings-and-ads
Native integration with Google that allows merchants to easily display their products across Google’s network.
WooPayments: Integrated WooCommerce Payments
woocommerce-payments
Securely accept credit and debit cards on your WooCommerce store. Manage payments without leaving your WordPress dashboard. Only with WooPayments.
WooCommerce PayPal Payments
woocommerce-paypal-payments
PayPal's latest payment processing solution. Accept PayPal, Pay Later, credit/debit cards, alternative digital wallets and bank accounts.
Click to Chat – HoliThemes
click-to-chat-for-whatsapp
WhatsApp Chat🔥. Let's make your Web page visitors contact you through 'WhatsApp', 'WhatsApp Business'. Add matching Widget✅
Trade Runner Developer Profile
1 plugin · 100 total installs
How We Detect Trade Runner
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/traderunner/css//wp-content/plugins/traderunner/js//wp-content/plugins/traderunner/js/traderunner.jstraderunner/css/traderunner.css?ver=traderunner/js/traderunner.js?ver=HTML / DOM Fingerprints
data-traderunner-noncetraderunner_data