WC Gift Packaging Security & Risk Analysis

wordpress.org/plugins/wc-gift-packaging

This plugin adds a 'Send this order packaged as gift' option on the WooCommerce checkout.

100 active installs v1.5 PHP + WP 3.0+ Updated Jul 30, 2019
checkoutgiftpackagingwoocommercewrapping
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WC Gift Packaging Safe to Use in 2026?

Generally Safe

Score 85/100

WC Gift Packaging has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "wc-gift-packaging" plugin v1.5 exhibits an exceptionally clean static analysis profile. The absence of identifiable attack surface points like AJAX handlers, REST API routes, shortcodes, or cron events suggests a limited potential for direct exploitation. Furthermore, the code does not appear to use dangerous functions or perform file operations, and it has no external HTTP requests, all of which are positive security indicators.

However, the static analysis does highlight a significant concern: 100% of output is not properly escaped. With three identified output points, this indicates a potential for Cross-Site Scripting (XSS) vulnerabilities if any user-supplied data is reflected directly to the browser without proper sanitization. The lack of nonce checks and capability checks on any potential entry points (though none were found) also represents a missed opportunity for robust access control.

The plugin's vulnerability history is remarkably clean, with no recorded CVEs. This suggests a mature and likely well-maintained codebase in terms of past security issues. Overall, while the current version of "wc-gift-packaging" v1.5 appears to have a strong foundation by minimizing its attack surface and avoiding common risky practices, the unescaped output remains a notable weakness that requires immediate attention.

Key Concerns

  • Unescaped output found
Vulnerabilities
None known

WC Gift Packaging Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WC Gift Packaging Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

WC Gift Packaging Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionwoocommerce_cart_calculate_feeswc-gift-packaging.php:85
actionwoocommerce_checkout_update_order_metawc-gift-packaging.php:109
actionwoocommerce_admin_order_data_after_billing_addresswc-gift-packaging.php:128
actionwoocommerce_order_details_after_order_tablewc-gift-packaging.php:146
actionwoocommerce_email_after_order_tablewc-gift-packaging.php:165
filterwoocommerce_general_settingswc-gift-packaging.php:199
Maintenance & Trust

WC Gift Packaging Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedJul 30, 2019
PHP min version
Downloads5K

Community Trust

Rating94/100
Number of ratings3
Active installs100
Developer Profile

WC Gift Packaging Developer Profile

GDY

2 plugins · 130 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
18 days
View full developer profile
Detection Fingerprints

How We Detect WC Gift Packaging

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wc-gift-packaging-checkbox
FAQ

Frequently Asked Questions about WC Gift Packaging