Woo Already Bought Security & Risk Analysis

wordpress.org/plugins/woo-already-bought

Inform your clients if they bought any product already or if product has been added to cart.

10 active installs v1.0 PHP + WP 3.0.1+ Updated Unknown
alreadyalready-in-cartboughtecommercewoocomerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Woo Already Bought Safe to Use in 2026?

Generally Safe

Score 100/100

Woo Already Bought has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'woo-already-bought' plugin, version 1.0, exhibits an exceptionally strong security posture based on the provided static analysis. The absence of any identifiable attack surface points (AJAX handlers, REST API routes, shortcodes, cron events) significantly limits potential entry vectors for attackers. Furthermore, the code signals demonstrate excellent security practices, with no dangerous functions, 100% prepared SQL statements, and 100% properly escaped output. The presence of capability checks further reinforces secure operation, and the lack of external HTTP requests or file operations removes common sources of vulnerability.

The taint analysis also reveals no critical or high severity flows, indicating that user-supplied data is not being processed in a way that could lead to injection attacks. The vulnerability history is equally clean, with zero known CVEs, indicating a history of stable and secure development. This combination of a minimal attack surface, robust coding practices, and a clean vulnerability record suggests a highly secure plugin at this version.

While the current analysis presents a very positive outlook, it's important to note that the lack of any analyzed taint flows (total flows analyzed: 0) means that while no issues were *found*, the depth of the taint analysis might be limited. However, given the other strong indicators, this is a minor observation. Overall, 'woo-already-bought' v1.0 appears to be a very secure plugin with no immediate security concerns.

Vulnerabilities
None known

Woo Already Bought Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Woo Already Bought Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Woo Already Bought Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterwoocommerce_general_settingswoo-already-bought.php:17
actionwoocommerce_before_single_productwoo-already-bought.php:23
actionwoocommerce_before_single_productwoo-already-bought.php:29
filterwc_add_to_cart_messagewoo-already-bought.php:35
Maintenance & Trust

Woo Already Bought Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Woo Already Bought Developer Profile

mattkrupnik

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Woo Already Bought

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wc-forwardswc-forward
FAQ

Frequently Asked Questions about Woo Already Bought