URWA for Dokan Security & Risk Analysis

wordpress.org/plugins/urwa-for-dokan

Description

10 active installs v1.0 PHP + WP 3.9+ Updated Oct 29, 2015
dokansidebaruserwidgetwidget-area
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is URWA for Dokan Safe to Use in 2026?

Generally Safe

Score 85/100

URWA for Dokan has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'urwa-for-dokan' v1.0 plugin exhibits a strong security posture based on the provided static analysis. The code demonstrates excellent security practices by implementing 100% prepared statements for SQL queries and ensuring all output is properly escaped, with no dangerous function calls or file operations detected. The absence of external HTTP requests and bundled libraries further minimizes potential attack vectors. The limited attack surface, consisting of a single shortcode and no unprotected AJAX handlers or REST API routes, is also a positive indicator.

However, the analysis does reveal a notable absence of nonce checks (0 recorded) and only a limited number of capability checks (2 recorded). While the current entry points are protected, the lack of nonce checks on shortcodes or any potential future AJAX/REST endpoints could become a concern if the plugin evolves. The taint analysis showing zero flows, while good, is based on zero flows analyzed, which might suggest limited complexity or limited test coverage in that specific area. The plugin's vulnerability history is clean, with no known CVEs, indicating a potentially secure track record, but this should be viewed in conjunction with the limited scope of the analysis. Overall, the plugin appears robust in its current state, with the primary area for improvement being the consistent implementation of nonce and capability checks across all potential entry points to further harden its security against future threats.

Key Concerns

  • Missing nonce checks
  • Limited capability checks
  • Taint analysis on 0 flows
Vulnerabilities
None known

URWA for Dokan Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

URWA for Dokan Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

URWA for Dokan Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[dokan-user-role-widget-areas] urwa-for-dokan.php:73
WordPress Hooks 3
actionwidgets_initurwa-for-dokan.php:66
filterwidget_texturwa-for-dokan.php:102
actionwidgets_initurwa-for-dokan.php:159
Maintenance & Trust

URWA for Dokan Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedOct 29, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

URWA for Dokan Developer Profile

Rob Smelik

3 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect URWA for Dokan

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
urwa-dokan-customerurwa-dokan-sellerurwa-dokan-administrator
HTML Comments
<!-- SECURITY: This line exists for security reasons to keep things locked down. --><!-- Register Dokan Customer sidebar --><!-- Widgets placed in this widget area only visible to Dokan Customers who are logged in. --><!-- Register Dokan Seller sidebar -->+19 more
Data Attributes
id="urwa-dokan-customer"id="urwa-dokan-seller"id="urwa-dokan-administrator"
Shortcode Output
[dokan-user-role-widget-areas]
FAQ

Frequently Asked Questions about URWA for Dokan