Integration of Sendy with WooCommerce Security & Risk Analysis

wordpress.org/plugins/wc-sendy

Automatically adds WooCommerce Customers name and email to Sendy List after the order status is marked completed.

100 active installs v1.1 PHP + WP 5.0+ Updated Mar 27, 2021
sendywoowoo-sendywoocommercewoocommerce-sendy
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Integration of Sendy with WooCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

Integration of Sendy with WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The plugin "wc-sendy" v1.1 exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, raw SQL queries, unescaped output, file operations, and the presence of 100% prepared statements for SQL queries are excellent indicators of secure coding practices. The plugin also demonstrates a lack of common attack vectors such as AJAX handlers, REST API routes, shortcodes, and cron events that often require robust authentication and authorization checks. Furthermore, the complete absence of known vulnerabilities in its history suggests a well-maintained and secure codebase over time.

However, a potential area of concern lies in the single external HTTP request. While the analysis doesn't indicate if this request is made in a secure manner or if it's vulnerable to issues like SSRF or insecure data transmission, it represents an external dependency that could introduce risks if not handled with extreme care. The complete lack of nonce and capability checks, while understandable given the limited attack surface reported (0 unprotected entry points), could be a concern if future versions introduce new functionalities that expand the attack surface without implementing these essential security measures. Overall, the plugin appears secure but relies heavily on the careful implementation of its single external HTTP request and the assumption that its limited attack surface will remain so.

Key Concerns

  • External HTTP requests present a potential risk
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Integration of Sendy with WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Integration of Sendy with WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0
Attack Surface

Integration of Sendy with WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwoocommerce_order_status_completedincludes\class-pt-wc-sendy.php:41
actionplugins_loadedwc-sendy.php:27
filterwoocommerce_integrationswc-sendy.php:41
Maintenance & Trust

Integration of Sendy with WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedMar 27, 2021
PHP min version
Downloads4K

Community Trust

Rating80/100
Number of ratings3
Active installs100
Developer Profile

Integration of Sendy with WooCommerce Developer Profile

ProThoughts.com

2 plugins · 7K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Integration of Sendy with WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wc-sendy/includes/js/wc-sendy-admin.js/wp-content/plugins/wc-sendy/includes/css/wc-sendy-admin.css
Script Paths
/wp-content/plugins/wc-sendy/includes/js/wc-sendy-admin.js
Version Parameters
wc-sendy/includes/js/wc-sendy-admin.js?ver=wc-sendy/includes/css/wc-sendy-admin.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Integration of Sendy with WooCommerce