WeCPi CE Security & Risk Analysis

wordpress.org/plugins/wecpi-ce

WeCPi CE allows you to import products from CSV.

10 active installs v1.0.1 PHP + WP 3.0+ Updated May 17, 2011
imageimportproductwecpiwp-e-commerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WeCPi CE Safe to Use in 2026?

Generally Safe

Score 85/100

WeCPi CE has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The 'wecpi-ce' v1.0.1 plugin exhibits a seemingly strong security posture based on the provided static analysis and vulnerability history. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface, with no identified unprotected entry points. Code analysis also shows positive signs, such as 100% of SQL queries utilizing prepared statements and a high percentage (75%) of outputs being properly escaped. The lack of known CVEs and recorded vulnerability history further suggests a history of secure development. However, the analysis does reveal some areas of concern. The presence of two flows with unsanitized paths, even though not classified as critical or high severity, warrants attention as it could potentially lead to unexpected behavior or vulnerabilities if exploited under specific circumstances. Additionally, the absence of nonce checks and capability checks on any potential, albeit currently non-existent, entry points represents a missed opportunity for robust security implementation. While the plugin appears safe due to its limited attack surface, the identified unsanitized paths and the lack of fundamental security checks indicate areas where security practices could be enhanced to prevent potential future risks.

Key Concerns

  • Flows with unsanitized paths found
  • No nonce checks implemented
  • No capability checks implemented
  • Outputs not always properly escaped
Vulnerabilities
None known

WeCPi CE Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WeCPi CE Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
13
40 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

75% escaped53 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
wecpi (wecpi.php:319)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WeCPi CE Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_initwecpi.php:295
actionadmin_menuwecpi.php:296
Maintenance & Trust

WeCPi CE Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedMay 17, 2011
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WeCPi CE Developer Profile

geegood.com

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WeCPi CE

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wecpi-ce/css/style.css/wp-content/plugins/wecpi-ce/js/script.js
Script Paths
/wp-content/plugins/wecpi-ce/js/script.js
Version Parameters
wecpi-ce/css/style.css?ver=wecpi-ce/js/script.js?ver=

HTML / DOM Fingerprints

JS Globals
wecpi_ce_script_params
FAQ

Frequently Asked Questions about WeCPi CE