WP e-Commerce Call for Price Security & Risk Analysis

wordpress.org/plugins/wp-e-commerce-call-for-price

This is a WP e-Commerce plugin that allows you to hide the price of a specific product and replace it with a message asking your customers to call for …

10 active installs v1.0 PHP + WP 3.1+ Updated Apr 17, 2012
call-for-pricecustom-metae-commercewp-e-commercewpec
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP e-Commerce Call for Price Safe to Use in 2026?

Generally Safe

Score 85/100

WP e-Commerce Call for Price has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The plugin "wp-e-commerce-call-for-price" v1.0 exhibits a generally positive security posture based on the static analysis provided. The absence of any identified CVEs in its history, coupled with the low complexity of its attack surface (zero AJAX, REST API, shortcodes, or cron events), suggests a history of responsible development and maintenance. The code analysis also reveals good practices in handling SQL queries, with 100% of them utilizing prepared statements, which significantly mitigates SQL injection risks. File operations and external HTTP requests are also absent, further reducing potential attack vectors.

However, a significant concern arises from the output escaping. With 37 total outputs and 0% properly escaped, this indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is displayed on the frontend without proper sanitization or escaping can be exploited by attackers to inject malicious scripts. Additionally, the lack of nonce checks on any potential entry points, while the attack surface is currently zero, means that if new entry points are added in the future without proper security measures, they would be immediately vulnerable.

In conclusion, while the plugin avoids many common pitfalls like vulnerable SQL queries or unpatched CVEs, the pervasive lack of output escaping is a critical weakness that requires immediate attention. The developers have demonstrated good practices in other areas, but this oversight leaves the plugin susceptible to XSS attacks. Addressing the output escaping issue is paramount to improving its overall security.

Key Concerns

  • 0% output escaping
  • 0 nonce checks
Vulnerabilities
None known

WP e-Commerce Call for Price Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP e-Commerce Call for Price Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
3 prepared
Unescaped Output
37
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared3 total queries

Output Escaping

0% escaped37 total outputs
Attack Surface

WP e-Commerce Call for Price Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actionplugins_loadedwpec-call_for_price.php:61
actionadmin_headwpec-call_for_price.php:70
actionwp_enqueue_scriptswpec-call_for_price.php:71
actionadmin_enqueue_scriptswpec-call_for_price.php:72
actionwp_headwpec-call_for_price.php:73
actionadmin_initwpec-call_for_price.php:74
actionwpsc_product_form_fields_endwpec-call_for_price.php:75
actionwpsc_product_form_fields_endwpec-call_for_price.php:76
actionadmin_menuwpec-call_for_price.php:81
actionadmin_initwpec-call_for_price.php:82
actionsave_postwpec-call_for_price.php:675
actionadmin_noticeswpec-call_for_price.php:693
Maintenance & Trust

WP e-Commerce Call for Price Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedApr 17, 2012
PHP min version
Downloads5K

Community Trust

Rating60/100
Number of ratings2
Active installs10
Developer Profile

WP e-Commerce Call for Price Developer Profile

themeszone

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP e-Commerce Call for Price

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-e-commerce-call-for-price/js/admin.js/wp-content/plugins/wp-e-commerce-call-for-price/js/front.js/wp-content/plugins/wp-e-commerce-call-for-price/css/style.css
Script Paths
/wp-content/plugins/wp-e-commerce-call-for-price/js/admin.js/wp-content/plugins/wp-e-commerce-call-for-price/js/front.js
Version Parameters
wp-e-commerce-call-for-price/css/style.css?ver=wp-e-commerce-call-for-price/js/admin.js?ver=wp-e-commerce-call-for-price/js/front.js?ver=

HTML / DOM Fingerprints

CSS Classes
cfp_iconsselected
Data Attributes
data-cfp-id
JS Globals
cfp_selected_icon
FAQ

Frequently Asked Questions about WP e-Commerce Call for Price