WooMaxMin for WooCommerce Security & Risk Analysis

wordpress.org/plugins/woomaxmin

WooCommerce Minimum & Maximum Purchase Limit plugin gives you the ability to set up minimum and maximum purchase limit for your customers.

10 active installs v1.1 PHP + WP 4.1+ Updated Mar 16, 2016
admine-commerceshopstorewp-e-commerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WooMaxMin for WooCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

WooMaxMin for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "woomaxmin" v1.1 plugin exhibits a generally positive security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events suggests a minimal attack surface. Furthermore, the code does not appear to utilize dangerous functions, perform file operations, or make external HTTP requests, which are common vectors for vulnerabilities. The fact that all SQL queries utilize prepared statements is a strong indicator of good database security practices.

However, a significant concern arises from the output escaping analysis. With 0% of its total outputs properly escaped, the plugin presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any data that is displayed to users, especially if it originates from user input or external sources, could be manipulated to inject malicious scripts. The lack of nonce and capability checks, while not directly leading to a deduction in this specific analysis due to the lack of entry points, indicates a potential weakness that could become exploitable if new entry points are introduced in future versions without corresponding security measures.

The plugin's vulnerability history is entirely clean, with no recorded CVEs. This, combined with the positive findings in the static analysis, suggests a generally well-maintained codebase. The absence of vulnerabilities in the past, especially with the current output escaping issue, might indicate that the plugin's functionality is limited or that it has not been subjected to extensive security testing or exploitation attempts. Nevertheless, the unescaped output remains a critical area of concern that should be addressed.

Key Concerns

  • 0% output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

WooMaxMin for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WooMaxMin for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

WooMaxMin for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionadmin_initadmin.php:15
actionadmin_menuadmin.php:16
actionadmin_initadmin.php:23
actionadmin_initadmin.php:28
actionadmin_noticesadmin.php:53
actionwoocommerce_checkout_processwoomaxmin.php:13
actionwoocommerce_before_cartwoomaxmin.php:14
actionwoocommerce_before_single_productwoomaxmin.php:55
actionwoocommerce_thankyouwoomaxmin.php:166
Maintenance & Trust

WooMaxMin for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedMar 16, 2016
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

WooMaxMin for WooCommerce Developer Profile

Himanshu Bhuyan

2 plugins · 10 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WooMaxMin for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/woomaxmin/woomaxmin.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WooMaxMin for WooCommerce