WC Give a Coupon Security & Risk Analysis

wordpress.org/plugins/wc-give-a-coupon

A plugin that automatically offers a discount coupon for every purchase made by setting a deadline.

0 active installs v1.1 PHP 5.6+ WP 3.7+ Updated Feb 7, 2021
coupondiscountgiftintegrationwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WC Give a Coupon Safe to Use in 2026?

Generally Safe

Score 85/100

WC Give a Coupon has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "wc-give-a-coupon" plugin version 1.1 exhibits a strong overall security posture based on the provided static analysis. There are no identified dangerous functions, external HTTP requests, file operations, or direct SQL queries without prepared statements. Furthermore, the lack of known CVEs and a clean vulnerability history suggests a well-maintained and secure codebase over time. The plugin also appears to have a very small attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events, which further minimizes potential entry points for attackers.

However, the analysis does reveal a significant concern: 100% of the identified output operations are not properly escaped. This presents a substantial risk for cross-site scripting (XSS) vulnerabilities. While there are no direct taint flows identified currently, the absence of output escaping means that any data, even if seemingly benign, could be maliciously crafted and executed within a user's browser. The lack of nonce and capability checks on any potential, albeit currently unrevealed, entry points is also a weakness that could be exploited if new entry points are introduced or if the current lack of an attack surface is a temporary state.

In conclusion, the plugin benefits from a clean history and robust internal coding practices regarding database interactions and dangerous functions. The primary and most immediate risk is the pervasive lack of output escaping, which leaves the door open for XSS attacks. Mitigating this would significantly improve the plugin's security.

Key Concerns

  • All outputs are unescaped
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

WC Give a Coupon Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WC Give a Coupon Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

WC Give a Coupon Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedgive-automatic-coupon.php:32
actionwoocommerce_order_status_changedgive-automatic-coupon.php:42
actionwoocommerce_account_dashboardgive-automatic-coupon.php:43
filterwoocommerce_settings_tabs_arrayincludes\class-wgac-setting-tab.php:17
filterwoocommerce_get_settings_pagesincludes\class-wgac-setting-tab.php:132
Maintenance & Trust

WC Give a Coupon Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedFeb 7, 2021
PHP min version5.6
Downloads910

Community Trust

Rating100/100
Number of ratings3
Active installs0
Developer Profile

WC Give a Coupon Developer Profile

ggfat

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WC Give a Coupon

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wc-give-a-coupon/languages/wp-content/plugins/wc-give-a-coupon/includes/class-wgac-setting-tab.php/wp-content/plugins/wc-give-a-coupon/includes/class-wgac-set-coupon.php

HTML / DOM Fingerprints

Data Attributes
page=wc-settings&tab=settings_give_coupon
Shortcode Output
<div style='display: inline-block; background: #f9f9f9; border: 1px dashed #999999; padding: 20px 50px;'><strong><div style='display: inline-block; background: #f9f9f9; border: 1px dashed #999999; padding: 20px 50px;'><h3><p>Expiry Date: </p>
FAQ

Frequently Asked Questions about WC Give a Coupon