WooDPD Security & Risk Analysis

wordpress.org/plugins/woodpd

Wordpress plugin for WooCommerce and DPD, with cart button widget.

10 active installs v1.0.0 PHP + WP 3.8+ Updated Nov 10, 2014
commercedpde-commercewoocommercewordpress-ecommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WooDPD Safe to Use in 2026?

Generally Safe

Score 85/100

WooDPD has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'woodpd' v1.0.0 plugin exhibits a mixed security posture. On one hand, the lack of any recorded vulnerabilities, CVEs, or identified critical/high severity taint flows is a positive indicator. The plugin also demonstrates good practices in handling SQL queries by exclusively using prepared statements and avoiding external HTTP requests and file operations, which are common attack vectors. However, the static analysis reveals significant concerns. The presence of a `create_function` call is a known dangerous function that can lead to arbitrary code execution if not handled with extreme caution and proper sanitization, which is not evident from the provided data. Furthermore, a very low percentage (16%) of output escaping is a major red flag, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The absence of any nonce checks or capability checks, combined with zero unprotected entry points, initially appears positive but could also mean the plugin has an extremely limited attack surface or that these checks are simply missing, leaving any potential future entry points vulnerable. The vulnerability history being clean is good, but the current code analysis points to potential weaknesses that could lead to future vulnerabilities.

Key Concerns

  • Dangerous function create_function used
  • Low output escaping (16%)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WooDPD Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WooDPD Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
16
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("WooDPD_Cart");'));woodpd.php:277

Output Escaping

16% escaped19 total outputs
Attack Surface

WooDPD Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
actionwoocommerce_after_shop_loop_itemwoodpd-template.php:16
actionwoocommerce_after_shop_loop_itemwoodpd-template.php:18
actionwoocommerce_after_shop_loop_itemwoodpd-template.php:20
actionwoocommerce_simple_add_to_cartwoodpd-template.php:28
actionwoocommerce_simple_add_to_cartwoodpd-template.php:30
actionwoocommerce_after_single_productwoodpd-template.php:35
actionwoocommerce_after_single_productwoodpd-template.php:37
actionwoocommerce_initwoodpd.php:27
actionplugins_loadedwoodpd.php:30
actioninitwoodpd.php:33
actionwoocommerce_product_options_skuwoodpd.php:39
actionsave_postwoodpd.php:45
filterwoocommerce_general_settingswoodpd.php:61
actionwidgets_initwoodpd.php:277
Maintenance & Trust

WooDPD Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedNov 10, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WooDPD Developer Profile

grendelccl

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WooDPD

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/woodpd/woodpd.php/wp-content/plugins/woodpd/woodpd-template.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WooDPD