Customers by Product Purchase Security & Risk Analysis

wordpress.org/plugins/woo-customers-by-product-purchase

Find out which customers has bought your "X" product.

10 active installs v0.1 PHP + WP 3.6+ Updated Mar 14, 2020
browserbrowsersiemodernizerreject
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Customers by Product Purchase Safe to Use in 2026?

Generally Safe

Score 85/100

Customers by Product Purchase has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "woo-customers-by-product-purchase" plugin v0.1 exhibits a mixed security posture. While the static analysis reveals no apparent direct entry points like AJAX handlers, REST API routes, or shortcodes that are unprotected, and all SQL queries are prepared, there are significant concerns. The extremely low percentage of properly escaped output (15%) suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis identified one flow with an unsanitized path classified as high severity, indicating a potential pathway for malicious data to be processed without adequate cleaning. The absence of nonce and capability checks across the board is a critical oversight, as it leaves any potential entry points, even if currently zero, vulnerable to unauthorized actions. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive sign, suggesting it has historically been free of known exploits. However, this history is limited, especially for an early version like 0.1, and does not negate the risks identified in the current code analysis.

Key Concerns

  • High percentage of unescaped output
  • High severity taint flow with unsanitized path
  • Zero nonce checks present
  • Zero capability checks present
Vulnerabilities
None known

Customers by Product Purchase Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Customers by Product Purchase Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
11
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

15% escaped13 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<view> (view.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Customers by Product Purchase Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitcustomers.php:61
filterwoocommerce_admin_reportscustomers.php:63
Maintenance & Trust

Customers by Product Purchase Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedMar 14, 2020
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Customers by Product Purchase Developer Profile

Tareq Hasan

9 plugins · 370 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Customers by Product Purchase

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/woo-customers-by-product-purchase/assets/css/style.css/wp-content/plugins/woo-customers-by-product-purchase/assets/js/custom.js
Script Paths
/wp-content/plugins/woo-customers-by-product-purchase/assets/js/custom.js
Version Parameters
woo-customers-by-product-purchase/assets/css/style.css?ver=woo-customers-by-product-purchase/assets/js/custom.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Customers by Product Purchase