WPC Order Test for WooCommerce Security & Risk Analysis

wordpress.org/plugins/wpc-order-test

Testing payment gateway for WooCommerce. Allows admins to simulate checkout without real payments and auto-completes the test orders.

0 active installs v1.0.1 PHP + WP 5.0+ Updated Mar 21, 2026
checkoutorderspayment-gatewaytest-orderwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPC Order Test for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

WPC Order Test for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "wpc-order-test" plugin version 1.0.1 presents a generally good security posture, with no recorded vulnerabilities and strong adherence to common security practices. The static analysis reveals that all identified entry points (AJAX handlers) are protected with authentication checks, and there are no open REST API routes, shortcodes, or cron events that could be exploited. The code demonstrates good practices in output escaping (98%) and consistently uses prepared statements for SQL queries, with no file operations or external HTTP requests that appear to be directly related to user input without validation.

However, a notable concern is the presence of three instances of the `unserialize` function. While no taint flows were identified with unsanitized paths in this analysis, the use of `unserialize` on untrusted data is a well-known vector for remote code execution vulnerabilities if not handled with extreme caution and strict validation of the unserialized data. The plugin also implements a reasonable number of nonce and capability checks (7 and 3 respectively), which is a positive sign for access control. The complete absence of past vulnerabilities is a strong indicator of responsible development or a very niche plugin, but it doesn't entirely negate the inherent risks associated with potentially dangerous functions.

In conclusion, "wpc-order-test" v1.0.1 is commendably secure in many aspects, particularly regarding its attack surface and data handling for SQL. The primary weakness lies in the use of `unserialize`, which, despite the lack of identified exploit paths in this analysis, warrants careful monitoring and potentially a review of its implementation to ensure maximum safety. The plugin's strengths in authentication, prepared statements, and output escaping are significant, but the `unserialize` function represents a potential, albeit currently unrealized, risk.

Key Concerns

  • Use of unserialize function
Vulnerabilities
None known

WPC Order Test for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WPC Order Test for WooCommerce Release Timeline

v1.0.1Current
v1.0.0
Code Analysis
Analyzed Apr 16, 2026

WPC Order Test for WooCommerce Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
2
94 escaped
Nonce Checks
7
Capability Checks
3
File Operations
0
External Requests
3
Bundled Libraries
0

Dangerous Functions Found

unserialize$plugins = unserialize( $response['body'] );includes/dashboard/wpc-dashboard.php:101
unserialize$plugins = unserialize( $response['body'] );includes/dashboard/wpc-dashboard.php:179
unserialize$plugins = unserialize( $response['body'] );includes/kit/wpc-kit.php:98

Output Escaping

98% escaped96 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

3 flows
ajax_export (includes/dashboard/wpc-dashboard.php:215)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WPC Order Test for WooCommerce Attack Surface

Entry Points5
Unprotected0

AJAX Handlers 5

authwp_ajax_wpc_get_pluginsincludes/dashboard/wpc-dashboard.php:9
authwp_ajax_wpc_get_suggestionincludes/dashboard/wpc-dashboard.php:10
authwp_ajax_wpc_exportincludes/dashboard/wpc-dashboard.php:11
authwp_ajax_wpc_importincludes/dashboard/wpc-dashboard.php:12
authwp_ajax_wpc_get_essential_kitincludes/kit/wpc-kit.php:22
WordPress Hooks 8
actionadmin_enqueue_scriptsincludes/dashboard/wpc-dashboard.php:7
actionadmin_menuincludes/dashboard/wpc-dashboard.php:8
actionbefore_woocommerce_initincludes/hpos.php:7
actionadmin_enqueue_scriptsincludes/kit/wpc-kit.php:20
actionadmin_menuincludes/kit/wpc-kit.php:21
actionadmin_initincludes/log/wpc-log.php:6
actionplugins_loadedwpc-order-test.php:41
filterwoocommerce_payment_gatewayswpc-order-test.php:46
Maintenance & Trust

WPC Order Test for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 21, 2026
PHP min version
Downloads112

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

WPC Order Test for WooCommerce Developer Profile

WPClever

73 plugins · 441K total installs

87
trust score
Avg Security Score
99/100
Avg Patch Time
76 days
View full developer profile
Detection Fingerprints

How We Detect WPC Order Test for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpc-order-test/includes/dashboard/css/dashboard.css/wp-content/plugins/wpc-order-test/includes/dashboard/js/backend.js
Script Paths
/wp-content/plugins/wpc-order-test/includes/dashboard/js/backend.js
Version Parameters
wpc-dashboard?ver=jquery-ui-dialog?ver=

HTML / DOM Fingerprints

Data Attributes
wp_localize_script('wpc-dashboard', 'wpc_dashboard_vars', {
JS Globals
wpc_dashboard_vars
FAQ

Frequently Asked Questions about WPC Order Test for WooCommerce