Bogo Deals For WooCommerce Security & Risk Analysis

wordpress.org/plugins/wc-bogo-deals

Special offers, such as 2×1 or 3×2 promotions, are an excellent way to encourage shoppers to fill their carts and return for more.

10 active installs v1.0.7 PHP 7.4+ WP 6.8+ Updated Jan 13, 2026
2x1bogo-dealsoffers
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Bogo Deals For WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

Bogo Deals For WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "wc-bogo-deals" plugin v1.0.7 exhibits a mixed security posture. On the positive side, there are no recorded vulnerabilities (CVEs), no dangerous functions used, all SQL queries are prepared, and there are no file operations or external HTTP requests, which are all excellent indicators of secure coding practices. Furthermore, the static analysis shows a remarkably small attack surface with zero AJAX handlers, REST API routes, shortcodes, or cron events, and a complete lack of unsanitized taint flows. This suggests that the plugin is designed with security in mind, minimizing potential entry points for attackers.

However, a significant concern arises from the output escaping analysis. With 100% of its outputs unescaped, this plugin presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-provided data displayed on the frontend without proper sanitization could be exploited by attackers to inject malicious scripts. Additionally, the absence of nonce checks and capability checks, while potentially justifiable given the limited attack surface, still represent missed opportunities to strengthen security by verifying user permissions and preventing Cross-Site Request Forgery (CSRF) attacks. The bundled Select2 library, while not inherently a vulnerability, should be monitored for potential outdated versions in future assessments.

Key Concerns

  • All outputs unescaped
  • No nonce checks
  • No capability checks
  • Bundled Select2 library
Vulnerabilities
None known

Bogo Deals For WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Bogo Deals For WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Select2

SQL Query Safety

100% prepared2 total queries

Output Escaping

0% escaped5 total outputs
Attack Surface

Bogo Deals For WooCommerce Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Bogo Deals For WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 13, 2026
PHP min version7.4
Downloads384

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Bogo Deals For WooCommerce Developer Profile

Lets Go Dev

2 plugins · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Bogo Deals For WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wc-bogo-deals/resources/assets/styles/list-admin.css/wp-content/plugins/wc-bogo-deals/resources/assets/styles/post-admin.css/wp-content/plugins/wc-bogo-deals/resources/assets/scripts/acf-editor.js
Script Paths
/wp-content/plugins/wc-bogo-deals/resources/assets/scripts/acf-editor.js
Version Parameters
wc-bogo-deals/resources/assets/styles/list-admin.css?ver=wc-bogo-deals/resources/assets/styles/post-admin.css?ver=wc-bogo-deals/resources/assets/scripts/acf-editor.js?ver=

HTML / DOM Fingerprints

JS Globals
BOGO_DEALS_URL
FAQ

Frequently Asked Questions about Bogo Deals For WooCommerce