Wollow Security & Risk Analysis

wordpress.org/plugins/wollow

Wollow is a powerful plugin that helps you to connect your woocommerce with whatsapp.

10 active installs v1.0.1 PHP + WP 5.5+ Updated Unknown
mobile-notificationorder-notificationwhatsapp-notificationwoocommerce-notification
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Wollow Safe to Use in 2026?

Generally Safe

Score 100/100

Wollow has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "wollow" v1.0.1 plugin exhibits a generally positive security posture, particularly with its attack surface appearing to be zero, indicating no immediately exposed administrative functions or public-facing endpoints. The absence of known CVEs in its history is also a strong positive signal, suggesting a lack of publicly disclosed vulnerabilities. However, the static analysis reveals several areas for concern that temper this otherwise positive outlook. A significant issue is the low percentage of properly escaped output (17%), which presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, especially if user-supplied data is involved in these unescaped outputs. Additionally, the complete lack of nonce checks and capability checks for any potential entry points, even though the attack surface is reported as zero, is a critical oversight. This implies that if any functionality were to be discovered or introduced that bypasses the initial attack surface assessment, it would be entirely unprotected against CSRF or unauthorized access. The use of raw SQL queries, even with a majority using prepared statements, still presents a minor risk if the remaining queries handle user input without proper sanitization. While the plugin has no recorded vulnerability history, this can also be a sign of a less widely used plugin or a lack of thorough security auditing, rather than guaranteed security. The bundling of TinyMCE is a minor concern if it's an older version, but this is not explicitly stated. In conclusion, while "wollow" v1.0.1 has strengths in its minimal attack surface and clean vulnerability history, the significant unescaped output and missing authorization/validation checks are critical weaknesses that require immediate attention to mitigate potential security risks.

Key Concerns

  • Low output escaping percentage
  • Missing nonce checks
  • Missing capability checks
  • Raw SQL queries present
Vulnerabilities
None known

Wollow Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Wollow Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
2 prepared
Unescaped Output
19
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
4
External Requests
0
Bundled Libraries
1

Bundled Libraries

TinyMCE

SQL Query Safety

67% prepared3 total queries

Output Escaping

17% escaped23 total outputs
Attack Surface

Wollow Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 18
actionplugins_loadedincludes\class-wollow.php:157
actionadmin_enqueue_scriptsincludes\class-wollow.php:172
actionadmin_enqueue_scriptsincludes\class-wollow.php:173
actionadmin_menuincludes\class-wollow.php:176
actionadmin_initincludes\class-wollow.php:178
actionadmin_enqueue_scriptsincludes\class-wollow.php:201
actionadmin_enqueue_scriptsincludes\class-wollow.php:202
filtermanage_edit-shop_order_columnsincludes\class-wollow.php:204
actionmanage_shop_order_posts_custom_columnincludes\class-wollow.php:206
actionmanage_posts_extra_tablenavincludes\class-wollow.php:209
actionadmin_enqueue_scriptsincludes\class-wollow.php:224
actionadmin_enqueue_scriptsincludes\class-wollow.php:225
actionrestrict_manage_postsincludes\class-wollow.php:227
actionposts_whereincludes\class-wollow.php:228
actionrestrict_manage_postsincludes\class-wollow.php:229
actionposts_whereincludes\class-wollow.php:230
actionwp_enqueue_scriptsincludes\class-wollow.php:245
actionwp_enqueue_scriptsincludes\class-wollow.php:246
Maintenance & Trust

Wollow Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedUnknown
PHP min version
Downloads906

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Wollow Developer Profile

alusio

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Wollow

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wollow/admin/css/bootstrap.min.css/wp-content/plugins/wollow/admin/css/iziToast.min.css/wp-content/plugins/wollow/admin/css/styles.css/wp-content/plugins/wollow/admin/js/bootstrap.min.js/wp-content/plugins/wollow/admin/js/iziToast.min.js/wp-content/plugins/wollow/admin/js/main.js/wp-content/plugins/wollow/admin/js/tinymce.min.js
Script Paths
/wp-content/plugins/wollow/admin/js/bootstrap.min.js/wp-content/plugins/wollow/admin/js/iziToast.min.js/wp-content/plugins/wollow/admin/js/main.js/wp-content/plugins/wollow/admin/js/tinymce.min.js
Version Parameters
wollow/admin/css/bootstrap.min.css?ver=wollow/admin/css/iziToast.min.css?ver=wollow/admin/css/styles.css?ver=wollow/admin/js/bootstrap.min.js?ver=wollow/admin/js/iziToast.min.js?ver=wollow/admin/js/main.js?ver=wollow/admin/js/tinymce.min.js?ver=

HTML / DOM Fingerprints

Shortcode Output
<p>Hi {customer_name},<br>thanks for adding {product_name} on your cart.<br>Please let me know if you have any questions about the {order_details}.</p>
FAQ

Frequently Asked Questions about Wollow