WC Continue Shopping Options Security & Risk Analysis

wordpress.org/plugins/wc-continue-shopping-options

Most of the time as a Shop owner we always want to direct the customer at right place whenever customer is at Cart page to show related products or pr …

20 active installs v3.0 PHP 5.2.4+ WP 4.9+ Updated Apr 17, 2019
cart-optionscontinue-shopping-optionswcwoocommercewoocommerce-continue-shopping
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WC Continue Shopping Options Safe to Use in 2026?

Generally Safe

Score 85/100

WC Continue Shopping Options has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "wc-continue-shopping-options" v3.0 plugin presents a concerning security posture despite a lack of recorded vulnerabilities. The static analysis reveals a complete absence of typical entry points like AJAX handlers, REST API routes, shortcodes, and cron events, which is generally a positive sign. However, this zero-attack-surface finding is immediately contradicted by the taint analysis, which identifies two flows with unsanitized paths. Furthermore, the code analysis flags that 100% of output is not properly escaped, indicating a high likelihood of cross-site scripting (XSS) vulnerabilities. The complete lack of capability checks and nonce checks, coupled with the unsanitized paths, suggests that even though there are no direct entry points identified, any potential code execution or data manipulation paths could be exploited without proper authorization or validation.

The vulnerability history is clean, which could indicate either a truly secure plugin or that its vulnerabilities have simply not been discovered or reported. Given the identified issues in the static and taint analysis, the absence of CVEs is not enough to classify this plugin as secure. The primary risks stem from the potential for XSS due to unescaped output and the possibility of arbitrary code execution or data compromise through the unsanitized paths, especially in the absence of any authorization or nonce checks. While the plugin demonstrates good practices in avoiding dangerous functions and using prepared statements for SQL (though no SQL queries were found), the critical flaws in output handling and data sanitization outweigh these strengths.

Key Concerns

  • Unescaped output detected
  • Taint flows with unsanitized paths
  • No capability checks
  • No nonce checks
Vulnerabilities
None known

WC Continue Shopping Options Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WC Continue Shopping Options Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
woo_add_continue_shopping_button_to_cart (wc-continue-shopping-options.php:96)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WC Continue Shopping Options Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterwoocommerce_get_sections_productswc-continue-shopping-options.php:27
filterwoocommerce_get_settings_productswc-continue-shopping-options.php:34
actiontemplate_redirectwc-continue-shopping-options.php:89
actionwoocommerce_before_cart_tablewc-continue-shopping-options.php:95
Maintenance & Trust

WC Continue Shopping Options Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedApr 17, 2019
PHP min version5.2.4
Downloads10K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

WC Continue Shopping Options Developer Profile

midriffwebservices

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WC Continue Shopping Options

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
woocommerce-message
Shortcode Output
Continue Shopping →
FAQ

Frequently Asked Questions about WC Continue Shopping Options