Upload Add-on for Woocommerce Security & Risk Analysis

wordpress.org/plugins/upload-add-on-for-woocommerce

Upload Add-on for Woocommerce

10 active installs v1.1.1 PHP 5.6+ WP 4.4+ Updated Sep 14, 2020
addonfile-uploaduploadswoocommercewoocommerce-file-upload
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Upload Add-on for Woocommerce Safe to Use in 2026?

Generally Safe

Score 85/100

Upload Add-on for Woocommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "upload-add-on-for-woocommerce" plugin v1.1.1 demonstrates a strong security posture based on the provided static analysis. The absence of any identified attack surface entries like AJAX handlers, REST API routes, shortcodes, or cron events is a significant positive. Furthermore, the code signals indicate good development practices, with no dangerous functions, all SQL queries using prepared statements, and no file operations or external HTTP requests. The presence of capability checks, even if only one is found, is also a good sign.

However, a notable concern arises from the output escaping, where only 55% of the 11 total outputs are properly escaped. This leaves a portion of the plugin's output potentially vulnerable to cross-site scripting (XSS) if user-supplied data is not adequately sanitized before being displayed. The lack of identified taint flows and vulnerability history suggests no known critical or high-severity issues at this time, but the partial output escaping remains a tangible risk. The absence of nonce checks is not explicitly flagged as a deduction because there are no AJAX handlers to protect, thus no immediate risk is evident from this specific finding in isolation.

In conclusion, while the plugin exhibits excellent fundamental security by minimizing its attack surface and using secure database practices, the partially unescaped output presents a clear, albeit potentially low to medium severity, risk. The lack of past vulnerabilities is encouraging, but the identified code signal weakness warrants attention. A thorough review of the output handling functions is recommended to ensure robust XSS protection.

Key Concerns

  • Unescaped output detected (45%)
Vulnerabilities
None known

Upload Add-on for Woocommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Upload Add-on for Woocommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
6 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

55% escaped11 total outputs
Attack Surface

Upload Add-on for Woocommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 20
actionadmin_menuincludes\admin\menu_links.php:5
filterplugin_action_linksincludes\admin\menu_links.php:12
filterwoocommerce_product_data_tabsincludes\admin\tabs_page.php:6
actionwoocommerce_product_data_panelsincludes\admin\tabs_page.php:15
actionwoocommerce_process_product_metaincludes\admin\tabs_page.php:35
actionadmin_initincludes\class-wua-admin-settings.php:18
actionadmin_menuincludes\class-wua-admin.php:21
actionadmin_enqueue_scriptsincludes\enqueue.php:18
actionadmin_noticesincludes\functions.php:13
filteradmin_footer_textincludes\functions.php:35
actionwoocommerce_before_add_to_cart_buttonincludes\woo_ua_upload.php:6
filterwoocommerce_product_single_add_to_cart_textincludes\woo_ua_upload.php:33
filterwoocommerce_add_cart_item_dataincludes\woo_ua_upload.php:55
filterwoocommerce_get_cart_item_from_sessionincludes\woo_ua_upload.php:106
filterwoocommerce_get_item_dataincludes\woo_ua_upload.php:116
actionwoocommerce_checkout_create_order_line_itemincludes\woo_ua_upload.php:131
actionwoocommerce_cart_item_removedincludes\woo_ua_upload.php:143
actionwoocommerce_after_order_itemmetaincludes\woo_ua_upload.php:171
actionadmin_noticeswooua.php:88
actionplugins_loadedwooua.php:92
Maintenance & Trust

Upload Add-on for Woocommerce Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedSep 14, 2020
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Upload Add-on for Woocommerce Developer Profile

crystalwebpro

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Upload Add-on for Woocommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/upload-add-on-for-woocommerce/assets/css/woo_ua-admin.css/wp-content/plugins/upload-add-on-for-woocommerce/assets/js/admin.js
Script Paths
/wp-content/plugins/upload-add-on-for-woocommerce/assets/js/admin.js
Version Parameters
upload-add-on-for-woocommerce/assets/css/woo_ua-admin.css?ver=upload-add-on-for-woocommerce/assets/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
woocommerce_options_panel
Data Attributes
for="file_field"id="wua_file_addon"accept="image/*"
Shortcode Output
<input type="file" name='wua_file_addon' id="wua_file_addon" accept='image/*'>
FAQ

Frequently Asked Questions about Upload Add-on for Woocommerce