WC Order Test Security & Risk Analysis

wordpress.org/plugins/woo-order-test

Test your WooCommerce order process in seconds to ensure your checkout works correctly.

7K active installs v4.2 PHP + WP 3.0.1+ Updated Jul 8, 2025
woocommercewoocommerce-checkoutwoocommerce-orderwoocommerce-orders
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WC Order Test Safe to Use in 2026?

Generally Safe

Score 100/100

WC Order Test has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10mo ago
Risk Assessment

The "woo-order-test" plugin version 4.2 exhibits a strong security posture based on the provided static analysis. The absence of identified entry points like AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. The code also demonstrates good development practices by utilizing prepared statements for all SQL queries and properly escaping a high percentage of its output. There are no reported vulnerabilities in its history, which is a positive indicator of its security over time. The presence of capability checks also suggests an awareness of access control. However, the complete lack of nonce checks is a notable concern, as this is a fundamental security mechanism for preventing CSRF attacks, especially if any of the (currently undiscovered) entry points were to become active or exposed. The absence of taint analysis findings is positive, but the scope of the analysis (0 flows analyzed) makes it difficult to draw strong conclusions from this particular aspect. Overall, while the plugin appears to be secure due to its limited functionality and good coding practices, the missing nonce checks represent a potential weakness that warrants attention.

Key Concerns

  • Missing nonce checks
Vulnerabilities
None known

WC Order Test Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WC Order Test Release Timeline

v4.2Current
v4.1
v4.0
v3.5
v3.4
v3.3
v3.2
v3.1
Code Analysis
Analyzed Mar 16, 2026

WC Order Test Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
33 escaped
Nonce Checks
0
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

92% escaped36 total outputs
Attack Surface

WC Order Test Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 15
filterwoocommerce_payment_gatewaysadmin\functions.php:9
actionplugins_loadedadmin\functions.php:12
actionwp_body_openadmin\functions.php:94
actionwoocommerce_thankyouadmin\functions.php:218
filterwoocommerce_cart_needs_paymentadmin\functions.php:231
filterwoocommerce_available_payment_gatewaysadmin\functions.php:239
actionwoocommerce_after_checkout_validationadmin\functions.php:246
filterwoocommerce_order_needs_paymentadmin\functions.php:254
filterwp_mailadmin\functions.php:263
actionadmin_initwc-ot.php:17
actionadmin_noticeswc-ot.php:19
actionactivated_pluginwc-ot.php:28
actionadmin_initwc-ot.php:37
actionadmin_enqueue_scriptswc-ot.php:62
filterwoocommerce_gateway_titlewc-ot.php:78
Maintenance & Trust

WC Order Test Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJul 8, 2025
PHP min version
Downloads153K

Community Trust

Rating100/100
Number of ratings21
Active installs7K
Developer Profile

WC Order Test Developer Profile

WP Fix It - WordPress Experts

10 plugins · 9K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WC Order Test

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/woo-order-test/admin/assets/wcot.css
Version Parameters
woo-order-test/admin/assets/wcot.css?ver=

HTML / DOM Fingerprints

CSS Classes
ticket-link
FAQ

Frequently Asked Questions about WC Order Test