Sync orders with Xero from WooCommerce – Xelation Security & Risk Analysis

wordpress.org/plugins/xelation

Automatically sync your WooCommerce orders with Xero along with payments, contacts & inventory.

80 active installs v0.1.3 PHP 7.0+ WP 5.0+ Updated Feb 2, 2026
connect-xerosync-xerowoocommerce-xerowoocommerce-xero-syncxero
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Sync orders with Xero from WooCommerce – Xelation Safe to Use in 2026?

Generally Safe

Score 100/100

Sync orders with Xero from WooCommerce – Xelation has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "xelation" plugin v0.1.3 presents a generally good security posture, with no recorded vulnerabilities or critical code signals. The static analysis shows a minimal attack surface with zero entry points identified. Code signals also indicate a lack of dangerous functions, file operations, and a high percentage of properly escaped outputs. The absence of known CVEs further bolsters its security profile.

However, there are a couple of areas that warrant attention. The plugin makes two external HTTP requests, which could potentially be leveraged in certain attack scenarios if not handled securely on the remote end or if there are vulnerabilities in how the plugin processes the responses. Additionally, the single SQL query is not using prepared statements, which represents a risk of SQL injection, albeit a low one given it's only one instance and potentially with limited user input in this specific query.

Despite these minor concerns, the plugin appears to follow many security best practices. The lack of vulnerability history is a strong positive indicator, suggesting consistent security focus from the developers. The primary weakness lies in the non-prepared SQL query and the external HTTP requests. Overall, the risk is low, but these points should be addressed for enhanced security.

Key Concerns

  • Raw SQL query without prepared statements
  • External HTTP requests made by the plugin
Vulnerabilities
None known

Sync orders with Xero from WooCommerce – Xelation Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Sync orders with Xero from WooCommerce – Xelation Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
1
20 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
2
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

95% escaped21 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<plugin-status> (inc\plugin-status.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Sync orders with Xero from WooCommerce – Xelation Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuinc\functions.php:13
filterplugin_action_linksinc\functions.php:26
actionadmin_print_stylesxelation.php:32
Maintenance & Trust

Sync orders with Xero from WooCommerce – Xelation Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.0
Last updatedFeb 2, 2026
PHP min version7.0
Downloads1K

Community Trust

Rating100/100
Number of ratings5
Active installs80
Developer Profile

Sync orders with Xero from WooCommerce – Xelation Developer Profile

glidedigital

1 plugin · 80 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Sync orders with Xero from WooCommerce – Xelation

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/xelation/common/css/plugin.min.css
Version Parameters
xelation/common/css/plugin.min.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Sync orders with Xero from WooCommerce – Xelation