Custom Fee Woocommerce Security & Risk Analysis

wordpress.org/plugins/woo-custom-fee

Custom Fee Woocommerce allows administrator to add custom fee to customer's order total conditionally and easily.

400 active installs v1.8 PHP + WP 3.0.1+ Updated Aug 21, 2025
custom-feedynamic-feeextra-feeservice-chargeshipping-fee
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Custom Fee Woocommerce Safe to Use in 2026?

Generally Safe

Score 100/100

Custom Fee Woocommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7mo ago
Risk Assessment

The static analysis of "woo-custom-fee" v1.8 reveals an exceptionally clean codebase with no identified attack surface, dangerous functions, or SQL queries that are not properly prepared. All output appears to be correctly escaped, and there are no file operations or external HTTP requests to consider. The absence of taint analysis findings further indicates a low risk of client-side vulnerabilities originating from this plugin.

The vulnerability history is equally encouraging, with zero recorded CVEs. This suggests a history of responsible development and a lack of previously exploited weaknesses. The plugin exhibits strong adherence to secure coding practices, with a notable lack of common WordPress vulnerability types. Overall, this plugin appears to have a very strong security posture based on the provided data.

While the analysis indicates excellent security, the complete absence of nonce and capability checks across all identified entry points (albeit zero) is a point to note. In scenarios where entry points might exist and are not explicitly checked, this could be a potential area for future improvement or heightened vigilance during any future analysis. However, given the current data showing no entry points, this is a theoretical concern rather than an immediate risk.

Key Concerns

  • Missing capability checks on potential entry points
  • Missing nonce checks on potential entry points
Vulnerabilities
None known

Custom Fee Woocommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Fee Woocommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

Custom Fee Woocommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterwoocommerce_settings_tabs_arraywoo-custom-fee.php:18
actionwoocommerce_settings_tabs_custom_shipping_feewoo-custom-fee.php:19
actionwoocommerce_update_options_custom_shipping_feewoo-custom-fee.php:20
actionwoocommerce_cart_calculate_feeswoo-custom-fee.php:126
Maintenance & Trust

Custom Fee Woocommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedAug 21, 2025
PHP min version
Downloads11K

Community Trust

Rating90/100
Number of ratings2
Active installs400
Developer Profile

Custom Fee Woocommerce Developer Profile

Vidish

6 plugins · 8K total installs

88
trust score
Avg Security Score
100/100
Avg Patch Time
84 days
View full developer profile
Detection Fingerprints

How We Detect Custom Fee Woocommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Custom Fee Woocommerce