Digital Goods Checkout on WooCommerce Security & Risk Analysis

wordpress.org/plugins/wc-digital-goods-checkout

Hide billing fields when have only digital products in the cart

200 active installs v1.1.0 PHP + WP 4.0+ Updated Aug 10, 2020
digital-goodsvirtual-productswoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Digital Goods Checkout on WooCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

Digital Goods Checkout on WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

Based on the static analysis and vulnerability history, the wc-digital-goods-checkout plugin v1.1.0 presents a strong initial security posture. The absence of any identified dangerous functions, external HTTP requests, file operations, and the use of prepared statements for all SQL queries are significant strengths. Furthermore, all identified outputs are properly escaped, and there are no recorded vulnerabilities, which suggests diligent development practices. The plugin also has a minimal attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events without proper checks.

However, a notable concern is the complete lack of nonce and capability checks across all analyzed entry points, including the zero AJAX handlers, REST API routes, shortcodes, and cron events. While the static analysis reports zero entry points overall, the absence of these fundamental security mechanisms is a significant oversight. If any entry points were to be introduced or discovered in the future, they would be inherently unprotected. The lack of any taint analysis results (0 flows analyzed) also makes it impossible to definitively rule out potential vulnerabilities related to data sanitization, although the absence of dangerous functions and prepared statements mitigates some of this risk.

In conclusion, the plugin demonstrates good practices in areas like SQL and output sanitization, and its current vulnerability record is excellent. Nevertheless, the complete absence of nonce and capability checks, even with a zero attack surface, represents a critical architectural weakness that leaves it exposed to potential exploits should its attack surface expand. This lack of fundamental security checks is the primary area of concern.

Key Concerns

  • Complete lack of nonce checks
  • Complete lack of capability checks
  • No taint analysis performed
Vulnerabilities
None known

Digital Goods Checkout on WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Digital Goods Checkout on WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Digital Goods Checkout on WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitwc-digital-goods-checkout.php:49
actionwoocommerce_checkout_fieldswc-digital-goods-checkout.php:50
filterwcbcf_disable_checkout_validationwc-digital-goods-checkout.php:51
actionplugins_loadedwc-digital-goods-checkout.php:133
Maintenance & Trust

Digital Goods Checkout on WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedAug 10, 2020
PHP min version
Downloads12K

Community Trust

Rating96/100
Number of ratings10
Active installs200
Developer Profile

Digital Goods Checkout on WooCommerce Developer Profile

Claudio Sanches

17 plugins · 134K total installs

69
trust score
Avg Security Score
85/100
Avg Patch Time
831 days
View full developer profile
Detection Fingerprints

How We Detect Digital Goods Checkout on WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Digital Goods Checkout on WooCommerce