VoucherMe for WooCommerce Security & Risk Analysis

wordpress.org/plugins/voucherme-for-woocommerce

Allow your customers to purchase eVouchers & Hard Copy Vouchers on your website that can be redeemed both online and in-store.

0 active installs v1.6.4 PHP 7.0+ WP 4.7+ Updated Nov 29, 2025
gift-cardsgift-certificatesgift-vouchersgiftsvouchers
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is VoucherMe for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

VoucherMe for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The voucherme-for-woocommerce plugin, version 1.6.4, exhibits a strong security posture based on the provided static analysis. The complete absence of an apparent attack surface, including AJAX handlers, REST API routes, shortcodes, and cron events without authentication checks, is a significant strength. Furthermore, all detected SQL queries are properly prepared, and there are no indications of critical or high-severity taint flows. The plugin also has a clean vulnerability history with no recorded CVEs, suggesting a proactive approach to security by the developers.

However, there are a few areas that warrant attention. The low percentage of properly escaped output (67%) indicates a potential for cross-site scripting (XSS) vulnerabilities if the unescaped outputs are user-controlled. While the number of such outputs is small (3 total), it remains a risk. The presence of one external HTTP request without further context is also a minor concern, as it could be a vector for supply chain attacks if the external resource is compromised or malicious. The lack of capability checks on any entry points, combined with zero nonce checks that are not associated with authentication, suggests that all entry points are implicitly public or rely on other WordPress security mechanisms. While the current analysis shows no immediate critical flaws, the limited number of code signals analyzed for output escaping and the single external HTTP request prevent a perfect score.

Key Concerns

  • Low percentage of properly escaped output
  • External HTTP request without further context
Vulnerabilities
None known

VoucherMe for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

VoucherMe for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
10 prepared
Unescaped Output
1
2 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared10 total queries

Output Escaping

67% escaped3 total outputs
Attack Surface

VoucherMe for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actioninitwoocommerce-voucherme.php:52
actionwp_enqueue_scriptswoocommerce-voucherme.php:53
actionwc_ajax_voucherme_processwoocommerce-voucherme.php:54
actionwc_ajax_nopriv_voucherme_processwoocommerce-voucherme.php:55
actionwc_ajax_voucherme_removewoocommerce-voucherme.php:56
actionwc_ajax_nopriv_voucherme_removewoocommerce-voucherme.php:57
actionwoocommerce_cart_calculate_feeswoocommerce-voucherme.php:58
actionwoocommerce_settings_tabs_settings_vouchermewoocommerce-voucherme.php:61
actionwoocommerce_update_options_settings_vouchermewoocommerce-voucherme.php:62
actionwoocommerce_review_order_before_paymentwoocommerce-voucherme.php:63
actionwoocommerce_checkout_processwoocommerce-voucherme.php:64
actionwoocommerce_thankyouwoocommerce-voucherme.php:65
filterwoocommerce_settings_tabs_arraywoocommerce-voucherme.php:68
Maintenance & Trust

VoucherMe for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedNov 29, 2025
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

VoucherMe for WooCommerce Developer Profile

Dave Loftus

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect VoucherMe for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/voucherme-for-woocommerce/css/style.css/wp-content/plugins/voucherme-for-woocommerce/css/jquery.modal.min.css/wp-content/plugins/voucherme-for-woocommerce/js/jquery.modal.min.js/wp-content/plugins/voucherme-for-woocommerce/js/script.js
Script Paths
/wp-content/plugins/voucherme-for-woocommerce/js/jquery.modal.min.js/wp-content/plugins/voucherme-for-woocommerce/js/script.js
Version Parameters
voucherme-for-woocommerce/css/style.css?ver=voucherme-for-woocommerce/css/jquery.modal.min.css?ver=voucherme-for-woocommerce/js/jquery.modal.min.js?ver=voucherme-for-woocommerce/js/script.js?ver=

HTML / DOM Fingerprints

JS Globals
WCVoucherMeData
REST Endpoints
/wp-json/wc-voucherme/
FAQ

Frequently Asked Questions about VoucherMe for WooCommerce