Zypento Abandoned Cart Recovery Security & Risk Analysis

wordpress.org/plugins/zypento-abandoned-cart-recovery

Recover lost revenue with AI-powered abandoned cart emails.

0 active installs v1.0.1 PHP 7.4+ WP 6.0+ Updated Mar 1, 2026
automationdataflowintegrationworkflow
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Zypento Abandoned Cart Recovery Safe to Use in 2026?

Generally Safe

Score 100/100

Zypento Abandoned Cart Recovery has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "zypento-abandoned-cart-recovery" plugin v1.0.1 exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, unescaped outputs, raw SQL queries, or unprotected entry points like AJAX handlers, REST API routes, and shortcodes is commendable. The plugin also diligently utilizes prepared statements for its SQL queries and performs capability checks. The sole external HTTP request is a point to monitor, but without further context, its security implications are uncertain.

However, the taint analysis reveals two flows with unsanitized paths that are flagged as high severity. This is a significant concern as it indicates potential pathways where user-supplied data could be mishandled, leading to unexpected or malicious behavior. While the vulnerability history is clean, the presence of these high-severity taint flows suggests that the plugin may not be as robust as its clean CVE record implies. These taint flows should be the primary focus for remediation.

In conclusion, the plugin demonstrates good practices in many areas, particularly in its handling of SQL and output escaping, and its limited attack surface. The clean vulnerability history is a positive sign. Nevertheless, the identified high-severity taint flows represent a critical weakness that needs immediate attention to ensure the plugin's overall security.

Key Concerns

  • High severity unsanitized taint flows
  • Single external HTTP request without context
Vulnerabilities
None known

Zypento Abandoned Cart Recovery Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Zypento Abandoned Cart Recovery Release Timeline

v1.0.1Current
v1.0.0
Code Analysis
Analyzed Apr 16, 2026

Zypento Abandoned Cart Recovery Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
0
123 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

100% escaped123 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
apply_discount (includes/features/class-coupon.php:237)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Zypento Abandoned Cart Recovery Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actioninitincludes/core/class-admin.php:49
actionadmin_enqueue_scriptsincludes/core/class-admin.php:50
actionadmin_menuincludes/core/class-admin.php:51
filterzypento_admin_settingsincludes/core/class-admin.php:52
actionzypento_admin_page_contentincludes/core/class-admin.php:53
filterzypento_admin_variablesincludes/core/class-admin.php:54
actionrest_api_initincludes/core/class-admin.php:55
actionwp_enqueue_scriptsincludes/core/class-frontend.php:37
actionwoocommerce_add_to_cartincludes/features/class-abandoned-cart.php:37
actionwoocommerce_thankyouincludes/features/class-abandoned-cart.php:38
actioninitincludes/features/class-coupon.php:55
actionwoocommerce_cart_calculate_feesincludes/features/class-coupon.php:56
Maintenance & Trust

Zypento Abandoned Cart Recovery Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 1, 2026
PHP min version7.4
Downloads195

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Zypento Abandoned Cart Recovery Developer Profile

sproutient

10 plugins · 90 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Zypento Abandoned Cart Recovery

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/zypento-abandoned-cart-recovery/assets/css/admin-main.css/wp-content/plugins/zypento-abandoned-cart-recovery/assets/js/admin-main.js/wp-content/plugins/zypento-abandoned-cart-recovery/assets/js/api-settings.js
Script Paths
/wp-content/plugins/zypento-abandoned-cart-recovery/assets/js/admin-main.js/wp-content/plugins/zypento-abandoned-cart-recovery/assets/js/api-settings.js
Version Parameters
zypento-abandoned-cart-recovery/assets/css/admin-main.css?ver=zypento-abandoned-cart-recovery/assets/js/admin-main.js?ver=zypento-abandoned-cart-recovery/assets/js/api-settings.js?ver=

HTML / DOM Fingerprints

CSS Classes
zypento-settingszypento-wishlist-setting-action-itemzypento-ac-settingszypento-ac-setting-action-item
Data Attributes
data-zypento-module
JS Globals
zypentoAdminVariables
REST Endpoints
/wp-json/zypento/v1
FAQ

Frequently Asked Questions about Zypento Abandoned Cart Recovery