Web:D Accounts Security & Risk Analysis

wordpress.org/plugins/wp-accounts

Manage your Clients, Invoices, Receipts and Payments. Send Invoices and Receipts to clients via email.

10 active installs v1.9.7 PHP 6.2+ WP 4.6+ Updated Unknown
accountingbookkeepinginvoicespaymentsreceipts
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Web:D Accounts Safe to Use in 2026?

Generally Safe

Score 100/100

Web:D Accounts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "wp-accounts" v1.9.7 plugin exhibits a generally good security posture with a strong emphasis on secure coding practices. The high percentage of prepared statements for SQL queries and proper output escaping are commendable, indicating developer awareness of common web vulnerabilities. The plugin also incorporates a healthy number of nonce and capability checks, further bolstering its defenses. However, a significant concern arises from the presence of an unprotected AJAX handler, which represents a direct entry point for potential attacks if not properly validated. The taint analysis reveals three high-severity flows with unsanitized paths, suggesting potential vulnerabilities where user-supplied input could be processed in an unsafe manner, leading to risks like path traversal or command injection if exploited.

The plugin's vulnerability history is currently clear, with no recorded CVEs. This absence of past publicly disclosed vulnerabilities is a positive sign and suggests a proactive approach to security by the developers or a lack of historical targeting. Despite the absence of known vulnerabilities, the identified unprotected AJAX handler and high-severity taint flows warrant immediate attention and remediation. Overall, while the plugin demonstrates many strengths in secure development, these specific weaknesses create exploitable avenues that need to be addressed to maintain a robust security profile.

Key Concerns

  • Unprotected AJAX handler
  • High severity unsanitized paths in taint analysis (3 flows)
Vulnerabilities
None known

Web:D Accounts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Web:D Accounts Code Analysis

Dangerous Functions
0
Raw SQL Queries
22
76 prepared
Unescaped Output
85
796 escaped
Nonce Checks
22
Capability Checks
21
File Operations
2
External Requests
1
Bundled Libraries
0

SQL Query Safety

78% prepared98 total queries

Output Escaping

90% escaped881 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

12 flows4 with unsanitized paths
wpa_invoices_action (wp-accounts.php:1427)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Web:D Accounts Attack Surface

Entry Points3
Unprotected1

AJAX Handlers 2

authwp_ajax_wpa_get_attachment_urlwp-accounts.php:38
authwp_ajax_dismiss_wp_accounts_notice_handlerwp-accounts.php:44

Shortcodes 1

[wpa-statement] wp-accounts.php:55
WordPress Hooks 23
filterplugin_row_metaincludes\class-wpa-common.php:293
actionadmin_initwp-accounts.php:35
actionwp_before_admin_bar_renderwp-accounts.php:36
actionadmin_menuwp-accounts.php:37
actionadmin_noticeswp-accounts.php:43
actionshow_user_profilewp-accounts.php:46
actionedit_user_profilewp-accounts.php:47
actionpersonal_options_updatewp-accounts.php:48
actionedit_user_profile_updatewp-accounts.php:49
actionwp_dashboard_setupwp-accounts.php:51
actionwoocommerce_initwp-accounts.php:57
actiontemplate_redirectwp-accounts.php:58
actionwoocommerce_before_cartwp-accounts.php:59
filterwc_empty_cart_messagewp-accounts.php:60
actionwoocommerce_before_calculate_totalswp-accounts.php:61
filterwoocommerce_email_enabled_customer_on_hold_orderwp-accounts.php:65
filterwoocommerce_email_enabled_customer_processing_orderwp-accounts.php:66
filterwoocommerce_email_enabled_customer_completed_orderwp-accounts.php:67
filterwoocommerce_email_enabled_customer_invoicewp-accounts.php:68
filterwoocommerce_email_enabled_customer_invoice_paidwp-accounts.php:69
actionadmin_initwp-accounts.php:369
filterwp_mail_content_typewp-accounts.php:3464
filterphpmailer_initwp-accounts.php:3465
Maintenance & Trust

Web:D Accounts Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version6.2
Downloads7K

Community Trust

Rating74/100
Number of ratings3
Active installs10
Developer Profile

Web:D Accounts Developer Profile

Oliver Campion

12 plugins · 43K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
869 days
View full developer profile
Detection Fingerprints

How We Detect Web:D Accounts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-accounts/css/jquery-ui.css/wp-content/plugins/wp-accounts/js/date-pickers.js/wp-content/plugins/wp-accounts/js/settings-pickers.js
Version Parameters
wp-accounts/js/date-pickers.js?ver=wp-accounts/js/settings-pickers.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpa-client-company-fieldwpa-client-address1-fieldwpa-client-address2-fieldwpa-client-address3-fieldwpa-client-town-fieldwpa-client-county-fieldwpa-client-postcode-fieldwpa-client-country-field+54 more
HTML Comments
<!-- wp_accounts_setup_database --><!-- wpa_add_plugin_action_links --><!-- wpa_admin_bar_render --><!-- wpa_menu -->+14 more
Data Attributes
data-wpa-client-companydata-wpa-client-address1data-wpa-client-address2data-wpa-client-address3data-wpa-client-towndata-wpa-client-county+56 more
JS Globals
wpaCommon
Shortcode Output
[wpa-statement]
FAQ

Frequently Asked Questions about Web:D Accounts