EasyShipper – EasyPost Integration for WooCommerce Security & Risk Analysis

wordpress.org/plugins/easyshipper

Easyshipper for WooCommerce allows your users to interface with the fantastic EasyPost Shipping API.

10 active installs v0.5 PHP + WP 3.0+ Updated Apr 6, 2014
easypostfree-easypost-integrationshippingwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EasyShipper – EasyPost Integration for WooCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

EasyShipper – EasyPost Integration for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The static analysis of easyshipper v0.5 reveals a plugin with a seemingly minimal attack surface and no identified dangerous functions or SQL queries executed without prepared statements. This suggests a good foundation in some core security practices. However, the complete absence of output escaping is a significant concern. This means that any data output by the plugin, even if not directly user-supplied, could be rendered in an unsafe manner, potentially leading to cross-site scripting (XSS) vulnerabilities if combined with other factors or future code additions.

The plugin also shows no history of known vulnerabilities, which is a positive indicator. However, a lack of past issues does not guarantee future security, especially given the identified lack of output escaping. The absence of AJAX handlers, REST API routes, shortcodes, and cron events, while reducing the immediate attack surface, also means fewer opportunities to examine security controls like nonces and capability checks in practice.

In conclusion, while easyshipper v0.5 exhibits strengths in avoiding dangerous functions and raw SQL, the complete lack of output escaping presents a notable weakness. The absence of vulnerability history is reassuring but should be considered in conjunction with the identified code quality issues. The plugin's security posture could be significantly improved by implementing proper output escaping.

Key Concerns

  • No output escaping
Vulnerabilities
None known

EasyShipper – EasyPost Integration for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

EasyShipper – EasyPost Integration for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

EasyShipper – EasyPost Integration for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwoocommerce_product_options_shippingeasypost_shipping.php:5
actionsave_posteasypost_shipping.php:7
actionwoocommerce_checkout_order_processedeasypost_shipping.php:59
filterwoocommerce_shipping_methodseasypost_shipping.php:336
actionadd_meta_boxeseasyshipper.php:35
Maintenance & Trust

EasyShipper – EasyPost Integration for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedApr 6, 2014
PHP min version
Downloads6K

Community Trust

Rating46/100
Number of ratings6
Active installs10
Developer Profile

EasyShipper – EasyPost Integration for WooCommerce Developer Profile

Sean Voss

3 plugins · 6K total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect EasyShipper – EasyPost Integration for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
easypost_data
Shortcode Output
<a href=src=EastPostCustoms Value
FAQ

Frequently Asked Questions about EasyShipper – EasyPost Integration for WooCommerce