Prune WooCommerce Orders Security & Risk Analysis

wordpress.org/plugins/woo-prune-orders

Adds tools to the WP Admin > WooCommerce > Status > Tools page to move all orders of the selected status and cutoff date into the trash, wher …

100 active installs v1.5 PHP 7.4+ WP 5.9+ Updated Sep 7, 2025
administratorprunetooltrashwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Prune WooCommerce Orders Safe to Use in 2026?

Generally Safe

Score 100/100

Prune WooCommerce Orders has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6mo ago
Risk Assessment

The "woo-prune-orders" v1.5 plugin exhibits a strong security posture based on the provided static analysis. The absence of any detected dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, and the use of prepared statements for all SQL queries indicate good development practices. Furthermore, the lack of identified critical or high-severity taint flows further strengthens this assessment. The plugin also has a clean vulnerability history with no known CVEs, suggesting a well-maintained and secure codebase over time.

However, the analysis does reveal a potential area for improvement: the complete absence of nonce checks and the presence of only one capability check across zero identified entry points. While there are currently no exposed entry points that would necessitate these checks, the lack of implementation suggests that if future functionality were to introduce such points, they might be implemented without these essential security measures. This could be a concern if the plugin's functionality expands in the future. Overall, the plugin is currently very secure, but the absence of built-in security checks for potential future entry points is a minor weakness.

Key Concerns

  • Missing nonce checks for potential entry points
  • Limited capability checks for potential entry points
Vulnerabilities
None known

Prune WooCommerce Orders Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Prune WooCommerce Orders Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

Prune WooCommerce Orders Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionbefore_woocommerce_initwoocommerce-prune-orders.php:14
actionadmin_enqueue_scriptswoocommerce-prune-orders.php:38
filterwoocommerce_debug_toolswoocommerce-prune-orders.php:96
Maintenance & Trust

Prune WooCommerce Orders Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedSep 7, 2025
PHP min version7.4
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Prune WooCommerce Orders Developer Profile

Sean Conklin

3 plugins · 300 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Prune WooCommerce Orders

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/woo-prune-orders/woo-prune-orders.php

HTML / DOM Fingerprints

Data Attributes
id="form_prune_cancelled_orders"id="form_prune_completed_orders"id="form_prune_failed_orders"id="form_prune_pending_orders"id="form_prune_refunded_orders"id="foo"
JS Globals
jQuery
FAQ

Frequently Asked Questions about Prune WooCommerce Orders