
Extended Settings for WooCommerce Security & Risk Analysis
wordpress.org/plugins/woo-extended-settingsSleek plugin designed to add versatility to WooCommerce. Supports One Page Shopping, redirect if cart is empty, remove additional product information, …
Is Extended Settings for WooCommerce Safe to Use in 2026?
Generally Safe
Score 85/100Extended Settings for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "woo-extended-settings" v1.0.0 plugin exhibits a generally strong security posture based on the static analysis provided. It has a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events, and notably, all entry points are protected. The code also demonstrates good practices by exclusively using prepared statements for SQL queries and having a high percentage of properly escaped output. The absence of file operations, external HTTP requests, and bundled libraries further contributes to a reduced risk profile.
However, there are a few areas that warrant attention. The taint analysis revealed two flows with unsanitized paths, which, while not flagged as critical or high severity in this instance, represent a potential vector for vulnerabilities if they involve user-controlled input. Furthermore, the complete lack of nonce checks and capability checks across all code, coupled with a lack of registered entry points, suggests that the plugin might not be designed to handle sensitive operations or user interactions that would typically require such protections. The clean vulnerability history is positive, indicating a lack of past exploitation, but the presence of the taint issues suggests proactive security measures like robust input validation and authorization checks should be considered.
Overall, "woo-extended-settings" v1.0.0 appears to be a safe plugin with no known critical vulnerabilities. Its minimal attack surface and good handling of common code vulnerabilities are strengths. The primary concern lies in the potential for unsanitized paths in taint flows and the absence of typical security checks like nonces and capability checks, which could become issues if the plugin's functionality expands or is used in a context requiring more granular access control.
Key Concerns
- Taint flow with unsanitized path
- Taint flow with unsanitized path
- No nonce checks detected
- No capability checks detected
- Low output escaping (91%)
Extended Settings for WooCommerce Security Vulnerabilities
Extended Settings for WooCommerce Release Timeline
Extended Settings for WooCommerce Code Analysis
Output Escaping
Data Flow Analysis
Extended Settings for WooCommerce Attack Surface
WordPress Hooks 6
Maintenance & Trust
Extended Settings for WooCommerce Maintenance & Trust
Maintenance Signals
Community Trust
Extended Settings for WooCommerce Alternatives
No alternatives data available yet.
Extended Settings for WooCommerce Developer Profile
1 plugin · 10 total installs
How We Detect Extended Settings for WooCommerce
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/woo-extended-settings/assets/css/frontend.css/wp-content/plugins/woo-extended-settings/assets/js/frontend.js/wp-content/plugins/woo-extended-settings/assets/js/frontend.min.js/wp-content/plugins/woo-extended-settings/assets/css/admin.css/wp-content/plugins/woo-extended-settings/assets/css/admin.min.css/wp-content/plugins/woo-extended-settings/assets/js/frontend.js/wp-content/plugins/woo-extended-settings/assets/js/frontend.min.js/wp-content/plugins/woo-extended-settings/assets/css/frontend.css?ver=/wp-content/plugins/woo-extended-settings/assets/js/frontend.js?ver=/wp-content/plugins/woo-extended-settings/assets/js/frontend.min.js?ver=/wp-content/plugins/woo-extended-settings/assets/css/admin.css?ver=/wp-content/plugins/woo-extended-settings/assets/css/admin.min.css?ver=HTML / DOM Fingerprints
wes-inv-data-wes-inv-woocommerce_extended_settings