Wholesale Security & Risk Analysis

wordpress.org/plugins/wholesale

Changes the price of the product in the shopping cart according to its quantity

30 active installs v1.0.0.4 PHP 7.0+ WP 5.1+ Updated Jan 21, 2022
shoppingwcwholesalewholesale-woocommercewoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Wholesale Safe to Use in 2026?

Generally Safe

Score 85/100

Wholesale has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

Based on the static analysis and vulnerability history provided, the "wholesale" v1.0.0.4 plugin exhibits a strong security posture. The absence of any identified dangerous functions, raw SQL queries, file operations, or external HTTP requests is commendable. Furthermore, the plugin demonstrates excellent practices by properly escaping all identified output and exclusively using prepared statements for any SQL interactions, indicating a robust defense against common web vulnerabilities like XSS and SQL injection.

The taint analysis revealing zero flows with unsanitized paths further reinforces this positive assessment. The lack of any recorded CVEs or historical vulnerabilities suggests either a history of diligent security maintenance or a lack of past discovery, which is generally a good sign for a plugin's current security. The minimal attack surface reported, with zero unprotected entry points, is also a significant strength.

However, the complete absence of nonces and capability checks across all entry points is a notable concern. While the current analysis shows no direct vulnerabilities stemming from this, it represents a significant gap in security best practices. This could potentially leave the plugin vulnerable to CSRF attacks or unauthorized actions if new entry points are introduced in future versions or if the existing ones are implicitly trusted without proper authorization checks. Despite this one significant weakness, the plugin's current state, based on the provided data, appears to be very secure.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Wholesale Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Wholesale Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Wholesale Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped5 total outputs
Attack Surface

Wholesale Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionwoocommerce_product_options_general_product_dataBackend\WCMetabox.php:15
actionwoocommerce_process_product_metaBackend\WCMetabox.php:16
actionplugins_loadedwholesale.php:27
actionplugins_loadedwholesale.php:28
actionplugins_loadedwholesale.php:29
actionwoocommerce_before_calculate_totalswholesale.php:31
Maintenance & Trust

Wholesale Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedJan 21, 2022
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

Wholesale Developer Profile

MohammadJafar Khajeh

5 plugins · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Wholesale

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
options_group
Data Attributes
id="mjwcws_qty"id="mjwcws_price_type"id="mjwcws_price"id="mjwcws_sale_price_type"id="mjwcws_sale_price"
Shortcode Output
<h3>Wholesale</h3>
FAQ

Frequently Asked Questions about Wholesale