ZenCart Products Display Security & Risk Analysis

wordpress.org/plugins/zencart-products

Simple plugin that allows you to add featured products, special products, or new products to any widget slot.

10 active installs v2.1.1 PHP + WP 3.5.1+ Updated Unknown
ecommercefeatured-productsnew-productsspecial-productszencart
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ZenCart Products Display Safe to Use in 2026?

Generally Safe

Score 100/100

ZenCart Products Display has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The zencart-products v2.1.1 plugin exhibits a mixed security posture. On the positive side, the static analysis shows no identified dangerous functions, all SQL queries utilize prepared statements, and there are no known CVEs or recorded vulnerabilities. This suggests a developer awareness of fundamental security practices like SQL injection prevention and a generally clean security track record.

However, significant concerns arise from the code analysis. The extremely low percentage of properly escaped output (7%) is a major red flag, indicating a high likelihood of cross-site scripting (XSS) vulnerabilities. The taint analysis revealing a flow with unsanitized paths further reinforces this risk, suggesting that user-supplied data may be processed or displayed without adequate sanitization, potentially leading to malicious code execution in the user's browser.

While the absence of direct attack vectors like AJAX handlers, REST API routes, and shortcodes is encouraging, the underlying code quality in output handling and data sanitization presents a substantial risk. The lack of nonce and capability checks on potential entry points (though none are explicitly listed, the general lack of these checks implies a weakness if any were to be introduced) is also a concern for authorization and integrity. The plugin's strengths lie in its database interaction security, but its weaknesses in output and path sanitization are critical and need immediate attention.

Key Concerns

  • Low output escaping percentage
  • Taint flow with unsanitized path
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

ZenCart Products Display Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ZenCart Products Display Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
40
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

7% escaped43 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<zencart_products_admin> (views\zencart_products_admin.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

ZenCart Products Display Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_initzencart_options.php:134
actionadmin_menuzencart_options.php:135
actionwidgets_initzencart_options.php:161
Maintenance & Trust

ZenCart Products Display Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating80/100
Number of ratings1
Active installs10
Developer Profile

ZenCart Products Display Developer Profile

techize

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ZenCart Products Display

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
id="fpd_product_count"name="fpd_product_count"id="fpd_title"name="fpd_title"id="zbs_product_count"name="zbs_product_count"+6 more
FAQ

Frequently Asked Questions about ZenCart Products Display