Extended Settings for WooCommerce Security & Risk Analysis

wordpress.org/plugins/woo-extended-settings

Sleek plugin designed to add versatility to WooCommerce. Supports One Page Shopping, redirect if cart is empty, remove additional product information, …

10 active installs v1.0.0 PHP + WP 4.0+ Updated Sep 10, 2019
checkout-one-page-shoppingextended-settings-for-woocommercewoocommerce-extended-settingswoocommerce-remove-billing-fieldswoocommerce-remove-shipping-fields
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Extended Settings for WooCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

Extended Settings for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "woo-extended-settings" v1.0.0 plugin exhibits a generally strong security posture based on the static analysis provided. It has a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events, and notably, all entry points are protected. The code also demonstrates good practices by exclusively using prepared statements for SQL queries and having a high percentage of properly escaped output. The absence of file operations, external HTTP requests, and bundled libraries further contributes to a reduced risk profile.

However, there are a few areas that warrant attention. The taint analysis revealed two flows with unsanitized paths, which, while not flagged as critical or high severity in this instance, represent a potential vector for vulnerabilities if they involve user-controlled input. Furthermore, the complete lack of nonce checks and capability checks across all code, coupled with a lack of registered entry points, suggests that the plugin might not be designed to handle sensitive operations or user interactions that would typically require such protections. The clean vulnerability history is positive, indicating a lack of past exploitation, but the presence of the taint issues suggests proactive security measures like robust input validation and authorization checks should be considered.

Overall, "woo-extended-settings" v1.0.0 appears to be a safe plugin with no known critical vulnerabilities. Its minimal attack surface and good handling of common code vulnerabilities are strengths. The primary concern lies in the potential for unsanitized paths in taint flows and the absence of typical security checks like nonces and capability checks, which could become issues if the plugin's functionality expands or is used in a context requiring more granular access control.

Key Concerns

  • Taint flow with unsanitized path
  • Taint flow with unsanitized path
  • No nonce checks detected
  • No capability checks detected
  • Low output escaping (91%)
Vulnerabilities
None known

Extended Settings for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Extended Settings for WooCommerce Release Timeline

v1.0.0Current
Code Analysis
Analyzed Apr 16, 2026

Extended Settings for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
21 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

91% escaped23 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
settings_page (includes/pages/WooCommerce_Extended_Settings_Page_Settings.php:449)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Extended Settings for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_enqueue_scriptsincludes/WooCommerce_Extended_Settings.php:128
actionadmin_enqueue_scriptsincludes/WooCommerce_Extended_Settings.php:129
actioninitincludes/WooCommerce_Extended_Settings.php:138
actioninitincludes/pages/WooCommerce_Extended_Settings_Page_Settings.php:66
actionadmin_initincludes/pages/WooCommerce_Extended_Settings_Page_Settings.php:69
actionadmin_menuincludes/pages/WooCommerce_Extended_Settings_Page_Settings.php:72
Maintenance & Trust

Extended Settings for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedSep 10, 2019
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Alternatives

Extended Settings for WooCommerce Alternatives

No alternatives data available yet.

Developer Profile

Extended Settings for WooCommerce Developer Profile

Nagy Paul Sorel

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Extended Settings for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/woo-extended-settings/assets/css/frontend.css/wp-content/plugins/woo-extended-settings/assets/js/frontend.js/wp-content/plugins/woo-extended-settings/assets/js/frontend.min.js/wp-content/plugins/woo-extended-settings/assets/css/admin.css/wp-content/plugins/woo-extended-settings/assets/css/admin.min.css
Script Paths
/wp-content/plugins/woo-extended-settings/assets/js/frontend.js/wp-content/plugins/woo-extended-settings/assets/js/frontend.min.js
Version Parameters
/wp-content/plugins/woo-extended-settings/assets/css/frontend.css?ver=/wp-content/plugins/woo-extended-settings/assets/js/frontend.js?ver=/wp-content/plugins/woo-extended-settings/assets/js/frontend.min.js?ver=/wp-content/plugins/woo-extended-settings/assets/css/admin.css?ver=/wp-content/plugins/woo-extended-settings/assets/css/admin.min.css?ver=

HTML / DOM Fingerprints

CSS Classes
wes-inv-
Data Attributes
data-wes-inv-
JS Globals
woocommerce_extended_settings
FAQ

Frequently Asked Questions about Extended Settings for WooCommerce