Web Cupón Security & Risk Analysis

wordpress.org/plugins/webcupon

Ofrece tus Cupones de Descuento de la forma más profesional e intuitiva, consigue tráfico y clientes hacia tu web. Nuevo plugin en Beta.

10 active installs v1.3 PHP + WP 3.0.1+ Updated Dec 21, 2013
cuponesdescuentoofertasproductosseoservicios
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Web Cupón Safe to Use in 2026?

Generally Safe

Score 85/100

Web Cupón has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The webcupon plugin v1.3 exhibits a generally good security posture based on the provided static analysis. The absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests is a positive indicator. Crucially, there are no identified taint flows with unsanitized paths, and the plugin has no recorded vulnerability history. This suggests a diligent approach to secure coding and a stable maintenance record.

However, there are notable areas of concern. The plugin has zero AJAX handlers and REST API routes without authentication checks, which is excellent. However, the entire attack surface, consisting of four shortcodes, is not explicitly protected by any nonce checks. Furthermore, only 10% of output escaping is properly implemented, leaving a significant portion of the output potentially vulnerable to cross-site scripting (XSS) attacks if user-supplied data is not handled correctly within those unescaped outputs. The presence of capability checks is a good sign, but their effectiveness is diminished by the lack of nonce protection on the shortcodes.

In conclusion, while the plugin's foundation appears solid with no known critical vulnerabilities or insecure direct data access patterns identified, the lack of nonce checks on its shortcode entry points and the alarmingly low output escaping rate present significant risks. These issues could lead to XSS vulnerabilities if user input is processed and displayed without proper sanitization, especially within the shortcode functionality. The plugin would benefit greatly from addressing these specific code-level weaknesses to achieve a truly robust security profile.

Key Concerns

  • No nonce checks on shortcodes
  • Low output escaping rate (10%)
Vulnerabilities
None known

Web Cupón Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Web Cupón Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
114
12 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

10% escaped126 total outputs
Data Flows
All sanitized

Data Flow Analysis

4 flows
wp_webcupon_options (trunk\webcupon.php:60)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Web Cupón Attack Surface

Entry Points4
Unprotected0

Shortcodes 4

[webcuponmap] sections\map.php:23
[webcuponofertas] sections\search.php:23
[webcuponmap] trunk\sections\map.php:23
[webcuponofertas] trunk\sections\search.php:23
WordPress Hooks 12
actionwp_enqueue_scriptstrunk\webcupon.php:31
actionadmin_menutrunk\webcupon.php:49
actionwp_headtrunk\widget-noimage.php:31
actionwidgets_inittrunk\widget-noimage.php:76
actionwp_headtrunk\widget.php:52
actionwidgets_inittrunk\widget.php:97
actionwp_enqueue_scriptswebcupon.php:31
actionadmin_menuwebcupon.php:49
actionwp_headwidget-noimage.php:31
actionwidgets_initwidget-noimage.php:76
actionwp_headwidget.php:52
actionwidgets_initwidget.php:97
Maintenance & Trust

Web Cupón Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedDec 21, 2013
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Web Cupón Developer Profile

tseo.pro

2 plugins · 10 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Web Cupón

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
webcupon_wrapper
Shortcode Output
[webcuponofertas][webcuponmap]
FAQ

Frequently Asked Questions about Web Cupón