WPC Update Variations In Cart for WooCommerce Security & Risk Analysis

wordpress.org/plugins/wpc-update-variations-in-cart

WPC Update Variations In Cart gives your customer power to change variation in cart.

200 active installs v1.2.2 PHP + WP 4.0+ Updated Dec 11, 2025
update-variationvariationwoocommercewpc
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPC Update Variations In Cart for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

WPC Update Variations In Cart for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The wpc-update-variations-in-cart plugin v1.2.2 exhibits a generally strong security posture, as evidenced by its lack of known vulnerabilities (CVEs) and the absence of critical or high-severity taint flows. The code analysis reveals good practices such as 100% use of prepared statements for SQL queries and a high percentage of properly escaped outputs. Furthermore, all identified entry points (AJAX handlers) appear to have authentication checks, and there are no unprotected REST API routes, shortcodes, or cron events. Nonce and capability checks are also present, indicating an effort to secure these functionalities.

However, a notable concern is the presence of three instances of the `unserialize` function. While no critical taint flows were detected, `unserialize` is inherently risky as it can lead to Remote Code Execution (RCE) if used with untrusted or maliciously crafted data. The plugin also makes three external HTTP requests, which could potentially be exploited if not handled securely, though the static analysis did not reveal specific vulnerabilities related to these.

Given the plugin's history of zero known vulnerabilities and the current static analysis findings, it appears to be well-maintained and developed with security in mind. The strengths lie in its robust handling of database queries and output escaping, and its comprehensive use of WordPress security mechanisms. The primary weakness is the reliance on `unserialize` without clear evidence of sanitization of the serialized data before processing, which warrants caution.

Key Concerns

  • Use of unserialize()
Vulnerabilities
None known

WPC Update Variations In Cart for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WPC Update Variations In Cart for WooCommerce Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
6
100 escaped
Nonce Checks
9
Capability Checks
2
File Operations
0
External Requests
3
Bundled Libraries
0

Dangerous Functions Found

unserialize$plugins = unserialize( $response['body'] );includes\dashboard\wpc-dashboard.php:111
unserialize$plugins = unserialize( $response['body'] );includes\dashboard\wpc-dashboard.php:189
unserialize$plugins = unserialize( $response['body'] );includes\kit\wpc-kit.php:98

Output Escaping

94% escaped106 total outputs
Data Flows
All sanitized

Data Flow Analysis

7 flows
ajax_export (includes\dashboard\wpc-dashboard.php:225)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WPC Update Variations In Cart for WooCommerce Attack Surface

Entry Points5
Unprotected0

AJAX Handlers 5

authwp_ajax_wpc_get_pluginsincludes\dashboard\wpc-dashboard.php:19
authwp_ajax_wpc_get_suggestionincludes\dashboard\wpc-dashboard.php:20
authwp_ajax_wpc_exportincludes\dashboard\wpc-dashboard.php:21
authwp_ajax_wpc_importincludes\dashboard\wpc-dashboard.php:22
authwp_ajax_wpc_get_essential_kitincludes\kit\wpc-kit.php:22
WordPress Hooks 13
actionadmin_enqueue_scriptsincludes\dashboard\wpc-dashboard.php:17
actionadmin_menuincludes\dashboard\wpc-dashboard.php:18
actionbefore_woocommerce_initincludes\hpos.php:7
actionadmin_enqueue_scriptsincludes\kit\wpc-kit.php:20
actionadmin_menuincludes\kit\wpc-kit.php:21
actionplugins_loadedwpc-update-variations-in-cart.php:37
actionadmin_noticeswpc-update-variations-in-cart.php:41
actioninitwpc-update-variations-in-cart.php:59
filterplugin_row_metawpc-update-variations-in-cart.php:62
actionwp_enqueue_scriptswpc-update-variations-in-cart.php:65
filterwoocommerce_cart_item_namewpc-update-variations-in-cart.php:68
actionwc_ajax_wpcuv_load_variationwpc-update-variations-in-cart.php:71
actionwc_ajax_wpcuv_update_variationwpc-update-variations-in-cart.php:74
Maintenance & Trust

WPC Update Variations In Cart for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 11, 2025
PHP min version
Downloads8K

Community Trust

Rating84/100
Number of ratings5
Active installs200
Developer Profile

WPC Update Variations In Cart for WooCommerce Developer Profile

WPClever

71 plugins · 441K total installs

87
trust score
Avg Security Score
99/100
Avg Patch Time
68 days
View full developer profile
Detection Fingerprints

How We Detect WPC Update Variations In Cart for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpc-update-variations-in-cart/assets/css/frontend.css/wp-content/plugins/wpc-update-variations-in-cart/assets/js/frontend.js
Version Parameters
wpc-update-variations-in-cart/assets/js/frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpcuv-editwpcuv-new-itemwpcuv-editorwpcuv-thumbnailwpcuv-thumbnail-oriwpcuv-thumbnail-newwpcuv-info
Data Attributes
wpcuv-security
JS Globals
wpcuv_vars
REST Endpoints
/wp-json/wpcuv/v1/update_variation
FAQ

Frequently Asked Questions about WPC Update Variations In Cart for WooCommerce