WC Delete orders Security & Risk Analysis

wordpress.org/plugins/wc-delete-orders

This plugin lets you nuke all existing orders — please use with caution!

300 active installs v1.2 PHP 7.4+ WP 6.0+ Updated Sep 18, 2025
bulk-deletedelete-ordersorders
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WC Delete orders Safe to Use in 2026?

Generally Safe

Score 100/100

WC Delete orders has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7mo ago
Risk Assessment

The wc-delete-orders plugin v1.2 presents a mixed security profile. On the positive side, it exhibits strong adherence to several WordPress security best practices. The static analysis reveals no direct attack surface through AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all identified output operations are properly escaped, and there are no file operations or external HTTP requests, significantly reducing common attack vectors. The presence of a nonce check and a capability check are also positive indicators of security consciousness. The vulnerability history shows a clean slate with no recorded CVEs, suggesting a generally secure development process or a lack of prior discovered issues.

However, a significant concern arises from the SQL query handling. The static analysis indicates that 100% of the 8 SQL queries do not utilize prepared statements. This is a critical vulnerability that could lead to SQL injection attacks, especially if any of the data used in these queries originates from user input without sufficient sanitization. While taint analysis shows no flows with unsanitized paths, this is based on zero flows being analyzed, which may not be comprehensive. The bundled Freemius v1.0 library, while not explicitly flagged as vulnerable in the provided data, could pose a risk if it's outdated and has known vulnerabilities that haven't been reported for this specific plugin's context.

In conclusion, the plugin demonstrates good practices in its attack surface management and output handling. The absence of historical vulnerabilities is reassuring. However, the pervasive use of raw SQL queries without prepared statements represents a substantial risk that needs immediate attention. The potential for outdated bundled libraries also warrants investigation. Addressing the SQL query vulnerability would significantly improve the plugin's security posture.

Key Concerns

  • SQL queries without prepared statements
  • Bundled outdated library (Freemius v1.0)
Vulnerabilities
None known

WC Delete orders Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WC Delete orders Release Timeline

v1.2Current
v1.1
Code Analysis
Analyzed Mar 16, 2026

WC Delete orders Code Analysis

Dangerous Functions
0
Raw SQL Queries
8
0 prepared
Unescaped Output
0
4 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Freemius1.0

SQL Query Safety

0% prepared8 total queries

Output Escaping

100% escaped4 total outputs
Attack Surface

WC Delete orders Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filteradmin_initwc-delete-all-orders.php:67
filterwoocommerce_debug_toolswc-delete-all-orders.php:68
Maintenance & Trust

WC Delete orders Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedSep 18, 2025
PHP min version7.4
Downloads9K

Community Trust

Rating60/100
Number of ratings11
Active installs300
Developer Profile

WC Delete orders Developer Profile

theorcawp

11 plugins · 1K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WC Delete orders

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
notice-success
FAQ

Frequently Asked Questions about WC Delete orders