WooChimpCommerce Security & Risk Analysis

wordpress.org/plugins/woochimpcommerce

A plugin which allows you to add MailChimp subscription option on the WooCommerce checkout page.

0 active installs v1.1 PHP + WP 4.1+ Updated Nov 24, 2020
checkoutmailchimpmailchimp-subscriberorderwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WooChimpCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

WooChimpCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "woochimpcommerce" v1.1 plugin exhibits a mixed security posture. On the positive side, it has no known past vulnerabilities, a clean record of CVEs, and its SQL queries are all properly prepared. The absence of file operations and dangerous functions is also a good indicator. However, significant concerns arise from the static analysis. The plugin has a notable attack surface with one unprotected AJAX handler, which is a direct entry point for potential malicious activity. Furthermore, the output escaping is alarmingly poor, with only 3% of outputs properly escaped, leaving it susceptible to Cross-Site Scripting (XSS) attacks. Taint analysis reveals that all analyzed flows involve unsanitized paths, which, while not reaching critical or high severity in this instance, points to a systemic issue with data handling. The lack of nonce checks and capability checks on its entry points exacerbates these risks, making it easier for attackers to leverage the unprotected AJAX handler for unauthorized actions or data manipulation. While the vulnerability history is currently clean, the present code-level weaknesses represent a substantial risk that could easily lead to future vulnerabilities if not addressed.

Key Concerns

  • Unprotected AJAX handler
  • Low percentage of properly escaped output
  • All taint flows have unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

WooChimpCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WooChimpCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
29
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
10
Bundled Libraries
0

Output Escaping

3% escaped30 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
wcc_test_init (woochimp.php:15)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

WooChimpCommerce Attack Surface

Entry Points2
Unprotected1

AJAX Handlers 1

authwp_ajax_mailchimp_shortcodewoochimp.php:674

Shortcodes 1

[WooChimpCommerce] woochimp.php:634
WordPress Hooks 7
actionadmin_menuwoochimp.php:10
actionwoocommerce_thankyouwoochimp.php:355
actionwoocommerce_after_order_noteswoochimp.php:519
actionwoocommerce_checkout_update_order_metawoochimp.php:547
actionadd_meta_boxeswoochimp.php:554
actionsave_postwoochimp.php:593
actionwoocommerce_process_product_metawoochimp.php:599
Maintenance & Trust

WooChimpCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedNov 24, 2020
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

WooChimpCommerce Developer Profile

Hiren Patel

2 plugins · 200 total installs

76
trust score
Avg Security Score
74/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WooChimpCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
nav-tab-wrappernav-tabnav-tab-active
FAQ

Frequently Asked Questions about WooChimpCommerce