Descartes ShipRush Integration Security & Risk Analysis

wordpress.org/plugins/descartes-shiprush-integration

Export orders to My.ShipRush.com and update tracking details.

20 active installs v1.0 PHP 8.0+ WP 5.8+ Updated May 27, 2025
fedexshippingupsusps
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Descartes ShipRush Integration Safe to Use in 2026?

Generally Safe

Score 100/100

Descartes ShipRush Integration has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10mo ago
Risk Assessment

The Descartes ShipRush Integration plugin v1.0 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of any identified dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), and properly escaped output are significant strengths. The presence of a nonce check, even with a limited attack surface, indicates an awareness of basic security practices. The plugin also has no recorded vulnerabilities or CVEs, suggesting a history of secure development.

However, the analysis reveals a complete lack of capability checks and only a single nonce check across zero entry points. While the attack surface is currently minimal, this could pose a risk if functionality is added in the future without proper authorization checks. The absence of taint analysis results also leaves a blind spot, as no complex data flows were examined.

In conclusion, the plugin is currently in a good security state due to its clean code and lack of historical vulnerabilities. The primary concern lies in the limited implementation of authorization mechanisms (capability checks) and the minimal use of nonces, which could become a weakness if the plugin's functionality expands without addressing these areas. A more comprehensive taint analysis would also provide greater assurance.

Key Concerns

  • No capability checks implemented
  • Minimal nonce checks (1 total, 0 unprotected)
  • No taint analysis results available
Vulnerabilities
None known

Descartes ShipRush Integration Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Descartes ShipRush Integration Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
14 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped14 total outputs
Attack Surface

Descartes ShipRush Integration Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menudescartes-shiprush-integration.php:21
actionadmin_initdescartes-shiprush-integration.php:56
filterplugin_action_linksdescartes-shiprush-integration.php:103
actionwoocommerce_admin_order_data_after_payment_infodescartes-shiprush-integration.php:121
actionadmin_enqueue_scriptsdescartes-shiprush-integration.php:496
Maintenance & Trust

Descartes ShipRush Integration Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedMay 27, 2025
PHP min version8.0
Downloads365

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Descartes ShipRush Integration Developer Profile

Descartes Systems Group

2 plugins · 1K total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Descartes ShipRush Integration

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/descartes-shiprush-integration/descartes-shiprush-integration.php

HTML / DOM Fingerprints

CSS Classes
shiprush_button
Data Attributes
onclick="invoke_connect()"
JS Globals
invoke_connect()
FAQ

Frequently Asked Questions about Descartes ShipRush Integration