
WP Keap/Infusionsoft WooCommerce Plugin Security & Risk Analysis
wordpress.org/plugins/wp-infusionsoft-woocommerceKeap/Infusionsoft WooCommerce Plugin allows you to quickly integrate WooCommerce Orders with Keap/Infusionsoft.
Is WP Keap/Infusionsoft WooCommerce Plugin Safe to Use in 2026?
Generally Safe
Score 100/100WP Keap/Infusionsoft WooCommerce Plugin has a strong security track record. Known vulnerabilities have been patched promptly.
The plugin "wp-infusionsoft-woocommerce" v1.2.0 exhibits a generally strong security posture, evidenced by the absence of unprotected entry points like AJAX handlers, REST API routes, and shortcodes. The code also demonstrates good practices with a high percentage of SQL queries using prepared statements and properly escaped output. The presence of numerous nonce and capability checks further indicates a conscious effort to secure functionality.
However, there are areas for concern. The taint analysis revealed two flows with unsanitized paths, and while they are not rated critical or high, they represent a potential risk for input sanitization vulnerabilities if not properly handled. Additionally, the plugin has a history of a medium severity CVE, specifically Cross-site Scripting, which was last patched in 2021. While currently unpatched vulnerabilities are zero, the past occurrence of XSS suggests that input validation and output encoding should remain a focus. The presence of file operations and external HTTP requests, while not inherently insecure, warrants careful review to ensure they are implemented securely and do not introduce vulnerabilities.
In conclusion, the plugin has a solid foundation with many security best practices implemented. The primary weaknesses lie in the identified unsanitized paths from the taint analysis and the historical XSS vulnerability. Continued vigilance in code review, especially around input handling and external interactions, is recommended. The plugin's strengths in authentication checks and prepared statements are commendable, but the identified areas require attention to maintain a robust security profile.
Key Concerns
- Taint flows with unsanitized paths
- Medium severity CVE in vulnerability history
WP Keap/Infusionsoft WooCommerce Plugin Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting
WP Keap/Infusionsoft WooCommerce Plugin Code Analysis
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
WP Keap/Infusionsoft WooCommerce Plugin Attack Surface
WordPress Hooks 31
Maintenance & Trust
WP Keap/Infusionsoft WooCommerce Plugin Maintenance & Trust
Maintenance Signals
Community Trust
WP Keap/Infusionsoft WooCommerce Plugin Alternatives
Keap Official Opt-in Forms
infusionsoft-official-opt-in-forms
Build your email subscriber list from visitors to your WordPress website with Keap's Official Opt-in Forms plugin.
WP Gravity Forms Keap/Infusionsoft
gf-infusionsoft
Gravity Forms Keap/infusionsoft Add-on sends Gravity Forms entries to infusionsoft/Keap CRM.
Integration for Keap/infusionsoft and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms
cf7-infusionsoft
Send Contact Form 7, WPForms, Elementor, Ninja Forms, Contact Form Entries Plugin and many other contact form submissions to infusionsoft/Keap.
Gravity Forms Keap Feed
systasis-gf-infusionsoft-feed
Sync form submissions between Gravity Forms and Keap
WP Keap/Infusionsoft WooCommerce Plugin Developer Profile
32 plugins · 105K total installs
How We Detect WP Keap/Infusionsoft WooCommerce Plugin
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-infusionsoft-woocommerce/assets/css/style.css/wp-content/plugins/wp-infusionsoft-woocommerce/assets/js/script.jswp-infusionsoft-woocommerce/assets/css/style.css?ver=wp-infusionsoft-woocommerce/assets/js/script.js?ver=HTML / DOM Fingerprints
vxc_infusionsoft_prodata-crmperks-infusionsoft-iddata-crmperks-infusionsoft-actionvxc_infusionsoft_ajax_object