Woo-Divi Security & Risk Analysis

wordpress.org/plugins/woo-divi

This is an extension for the Divi Builder. You would require Divi Builder and WooCommerce to be present. This will add a button to the Divi Builder si …

20 active installs v1.0.0 PHP + WP 4+ Updated Nov 15, 2016
divi-extensionwoocommerce-add-to-cart
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Woo-Divi Safe to Use in 2026?

Generally Safe

Score 85/100

Woo-Divi has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "woo-divi" plugin v1.0.0 exhibits a concerning security posture primarily due to its unprotected entry points. While the code analysis shows positive signs like 100% use of prepared statements for SQL queries and proper output escaping, these strengths are overshadowed by the presence of two AJAX handlers that lack any authentication or capability checks. This represents a significant attack surface that could be exploited by unauthenticated users.

The absence of nonce checks and capability checks on these AJAX handlers is a critical flaw. Without these protections, an attacker could potentially trigger these functions maliciously, leading to unintended actions within the WordPress environment. Taint analysis data is absent, which is neutral in this assessment, but the static analysis alone points to clear vulnerabilities. Furthermore, the plugin has no recorded vulnerability history, which, while positive, does not negate the immediately identifiable risks present in the current codebase.

In conclusion, the "woo-divi" plugin v1.0.0 has some good security practices in place regarding data handling and output. However, the fundamental flaw of unprotected AJAX endpoints creates a high risk. The lack of immediate vulnerabilities in its history does not compensate for this exposure. Users of this plugin should be aware of the potential for unauthorized actions through its AJAX functionalities.

Key Concerns

  • AJAX handlers without auth checks
  • AJAX handlers without capability checks
  • AJAX handlers without nonce checks
Vulnerabilities
None known

Woo-Divi Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Woo-Divi Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped9 total outputs
Attack Surface
2 unprotected

Woo-Divi Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_call_to_action_add_to_cartincludes\class-woodivi.php:174
noprivwp_ajax_call_to_action_add_to_cartincludes\class-woodivi.php:175
WordPress Hooks 5
actionplugins_loadedincludes\class-woodivi.php:139
actionadmin_enqueue_scriptsincludes\class-woodivi.php:154
actionadmin_enqueue_scriptsincludes\class-woodivi.php:155
actionwp_enqueue_scriptsincludes\class-woodivi.php:172
actionwp_enqueue_scriptsincludes\class-woodivi.php:173
Maintenance & Trust

Woo-Divi Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedNov 15, 2016
PHP min version
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Woo-Divi Developer Profile

vishalbasnet23

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Woo-Divi

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/woo-divi/css/woodivi-admin.css/wp-content/plugins/woo-divi/js/woodivi-admin.js
Script Paths
/wp-content/plugins/woo-divi/js/woodivi-admin.js
Version Parameters
woo-divi/css/woodivi-admin.css?ver=woo-divi/js/woodivi-admin.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Woo-Divi