WC API Custom Meta Security & Risk Analysis

wordpress.org/plugins/wc-api-custom-meta

Allows access to custom meta fields on products through the API.

50 active installs v0.7.1 PHP + WP 4.0.0+ Updated May 31, 2017
apiwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WC API Custom Meta Safe to Use in 2026?

Generally Safe

Score 85/100

WC API Custom Meta has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "wc-api-custom-meta" v0.7.1 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface to zero. Furthermore, the code analysis reveals no dangerous functions, no raw SQL queries (all prepared statements), and 100% output escaping, indicating robust protection against common injection and XSS vulnerabilities. The lack of file operations and external HTTP requests further reduces potential risks.

The plugin's vulnerability history is clean, with zero known CVEs, unpatched vulnerabilities, or recorded common vulnerability types. This, combined with the positive static analysis findings, suggests a well-developed and secure codebase. The single capability check indicates at least some level of authorization is considered, although the lack of nonce checks on entry points (which are none) is not a concern in this specific instance. The absence of any taint analysis findings further strengthens this positive assessment.

In conclusion, "wc-api-custom-meta" v0.7.1 appears to be a highly secure plugin. Its strengths lie in its minimal attack surface, diligent use of prepared statements and output escaping, and a clean vulnerability history. There are no specific security concerns identified in the provided data that would warrant deductions. This plugin demonstrates excellent security practices.

Vulnerabilities
None known

WC API Custom Meta Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WC API Custom Meta Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

WC API Custom Meta Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterwoocommerce_api_product_responsewc-api-custom-meta.php:75
actionwoocommerce_api_save_product_variationwc-api-custom-meta.php:92
Maintenance & Trust

WC API Custom Meta Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedMay 31, 2017
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs50
Developer Profile

WC API Custom Meta Developer Profile

Jason Judge

6 plugins · 910 total installs

81
trust score
Avg Security Score
81/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WC API Custom Meta

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wc-api-custom-meta/

HTML / DOM Fingerprints

REST Endpoints
/wp-json/wc-api-custom-meta/
FAQ

Frequently Asked Questions about WC API Custom Meta