Webhook For WCFM Vendors Security & Risk Analysis

wordpress.org/plugins/webhook-for-wcfm-vendors

Send order webhooks to your WCFM vendors.

10 active installs v1.0.1 PHP 7.0+ WP 5.4+ Updated Apr 26, 2024
connectmulti-vendorthird-partywcfmwebhook
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Webhook For WCFM Vendors Safe to Use in 2026?

Generally Safe

Score 92/100

Webhook For WCFM Vendors has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "webhook-for-wcfm-vendors" plugin v1.0.1 exhibits a generally good security posture based on the provided static analysis. The plugin has a limited attack surface with only two AJAX handlers, and importantly, all identified entry points are protected with authorization checks. The absence of critical or high-severity taint flows is a strong indicator of secure coding practices regarding data handling. The plugin also demonstrates a commitment to security by implementing nonce checks and capability checks for its AJAX endpoints.

However, there are areas for improvement. While most SQL queries utilize prepared statements, 50% do not, presenting a potential risk if these queries handle user-supplied data. Furthermore, a significant portion of output (33%) is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if the unescaped output contains user-controlled data. The single file operation could also be a concern if not handled with extreme care regarding input validation.

The plugin's vulnerability history is a significant strength, showing zero known CVEs. This suggests a history of developing secure code or a lack of targeted security research against this specific plugin. Coupled with the current static analysis findings, this paints a picture of a relatively safe plugin, but the identified code-level risks, particularly around SQL and output escaping, warrant attention.

Key Concerns

  • SQL queries without prepared statements
  • Unescaped output detected
  • Presence of file operations
Vulnerabilities
None known

Webhook For WCFM Vendors Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Webhook For WCFM Vendors Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
1 prepared
Unescaped Output
5
10 escaped
Nonce Checks
2
Capability Checks
1
File Operations
1
External Requests
2
Bundled Libraries
0

SQL Query Safety

50% prepared2 total queries

Output Escaping

67% escaped15 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
wcfm_ajax_test_webhook (includes\class-send-webhook.php:55)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Webhook For WCFM Vendors Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_wcfm_ajax_test_webhookincludes\class-send-webhook.php:49
authwp_ajax_save_admin_vendor_webhook_settingincludes\class-webhook-setting.php:57
WordPress Hooks 9
actionwp_enqueue_scriptsets-webhook-vendor-config.php:60
actionadmin_initets-webhook-vendor-config.php:62
actionadmin_noticesets-webhook-vendor-config.php:74
actionadmin_noticesets-webhook-vendor-config.php:80
actionwoocommerce_order_status_changedincludes\class-send-webhook.php:46
actionwcfm_vendor_settings_updateincludes\class-webhook-setting.php:48
actionend_wcfm_vendor_settingsincludes\class-webhook-setting.php:51
actionbegin_wcfm_vendors_new_formincludes\class-webhook-setting.php:53
actionend_wcfm_vendors_manage_formincludes\class-webhook-setting.php:55
Maintenance & Trust

Webhook For WCFM Vendors Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedApr 26, 2024
PHP min version7.0
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Webhook For WCFM Vendors Developer Profile

expresstechsoftware

14 plugins · 2K total installs

92
trust score
Avg Security Score
97/100
Avg Patch Time
8 days
View full developer profile
Detection Fingerprints

How We Detect Webhook For WCFM Vendors

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/webhook-for-wcfm-vendors/asset/css/style.css/wp-content/plugins/webhook-for-wcfm-vendors/asset/js/script.js
Script Paths
/wp-content/plugins/webhook-for-wcfm-vendors/asset/js/script.js
Version Parameters
webhook-for-wcfm-vendors/asset/css/style.css?ver=webhook-for-wcfm-vendors/asset/js/script.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-webhook_nounce
JS Globals
etsWebhookVendor
REST Endpoints
/wp-json/wcfm/v1/webhook/test
FAQ

Frequently Asked Questions about Webhook For WCFM Vendors