WC Bulk Buyer Discounts Security & Risk Analysis

wordpress.org/plugins/wc-bulk-buyer-discounts

WC Bulk Buyer Discounts is a simple discount plugin for Woocommerce using automatic one use only coupons.

10 active installs v1.0.0 PHP + WP 3.5+ Updated Mar 19, 2014
bulk-buyer-discountcouponscustom-discountswoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WC Bulk Buyer Discounts Safe to Use in 2026?

Generally Safe

Score 85/100

WC Bulk Buyer Discounts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The 'wc-bulk-buyer-discounts' v1.0.0 plugin presents a concerning security posture despite a lack of recorded vulnerabilities. The static analysis reveals significant areas for improvement in secure coding practices. While the attack surface is currently minimal, with no exposed AJAX handlers, REST API routes, or shortcodes, the presence of one cron event without explicit mention of authentication checks is a potential oversight. The most alarming findings relate to the handling of SQL queries and output escaping. With 100% of SQL queries not using prepared statements, this opens the door to SQL injection vulnerabilities. Similarly, the absence of any output escaping for the three identified output points suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities.

The vulnerability history is clean, showing no known CVEs. This could indicate either a truly secure plugin or, more likely given the static analysis findings, that the plugin has not been thoroughly audited or that its current installation base is not large enough to attract significant attacker attention or detailed security research. The lack of dangerous functions, file operations, external HTTP requests, nonce checks, and capability checks (for the limited entry points) are positive signs. However, these strengths are overshadowed by the critical risks associated with unescaped output and raw SQL queries. The overall risk is elevated due to the potential for severe vulnerabilities stemming from these insecure coding practices, which are common entry points for attackers.

Key Concerns

  • SQL queries not using prepared statements
  • Output not properly escaped
  • No nonce checks on cron events
  • No capability checks on cron events
Vulnerabilities
None known

WC Bulk Buyer Discounts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WC Bulk Buyer Discounts Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped3 total outputs
Attack Surface

WC Bulk Buyer Discounts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuwc-bulk-buyer-discounts.php:31
actionadmin_initwc-bulk-buyer-discounts.php:39
actionwcbbd_daily_event_hookwc-bulk-buyer-discounts.php:93
actionwoocommerce_before_cart_tablewc-bulk-buyer-discounts.php:130

Scheduled Events 1

wcbbd_daily_event_hook
Maintenance & Trust

WC Bulk Buyer Discounts Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedMar 19, 2014
PHP min version
Downloads2K

Community Trust

Rating50/100
Number of ratings2
Active installs10
Developer Profile

WC Bulk Buyer Discounts Developer Profile

Michael Hall

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WC Bulk Buyer Discounts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wbbd-settings-input
FAQ

Frequently Asked Questions about WC Bulk Buyer Discounts