Ahamove WooCommerce Security & Risk Analysis

wordpress.org/plugins/giao-hang-sieu-toc

Plugin hỗ trợ đặt đơn Ahamove (Giao hàng siêu tốc) với WooCommerce.

10 active installs v1.0.0 PHP + WP 4.0+ Updated Dec 26, 2022
checkoutshippingshopvietnamwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ahamove WooCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

Ahamove WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "giao-hang-sieu-toc" v1.0.0 plugin exhibits a significant security risk due to its unprotected AJAX endpoints. With 8 AJAX handlers identified and all of them lacking authentication checks, this plugin presents a wide attack surface for unauthorized access and execution of plugin functionalities. While the plugin demonstrates good practices in SQL query preparation (83%) and output escaping (96%), the absence of any nonce or capability checks on its AJAX endpoints is a critical oversight that bypasses fundamental WordPress security mechanisms.

The taint analysis, although with a small number of flows, shows that all three analyzed flows have unsanitized paths. While no critical or high severity taint issues were flagged, this indicates a potential for input validation and sanitization vulnerabilities that could be exploited, especially in conjunction with the unprotected AJAX handlers. The lack of any recorded vulnerability history in the past is a positive indicator, suggesting that the developers might have been diligent in addressing past issues. However, this does not negate the current, actively identified vulnerabilities in the code.

In conclusion, the plugin has strengths in its SQL and output handling, but these are overshadowed by the critical weakness of unprotected AJAX endpoints and concerning taint flow analysis. The total lack of nonce and capability checks on these critical entry points makes it highly vulnerable to various attacks, including unauthorized data manipulation or execution of arbitrary code within the plugin's context. This plugin should be considered high risk until these security deficiencies are addressed.

Key Concerns

  • 8 unprotected AJAX handlers
  • 0 Nonce checks on AJAX handlers
  • 0 Capability checks on AJAX handlers
  • 3 flows with unsanitized paths
  • 17% of SQL queries not prepared
Vulnerabilities
None known

Ahamove WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Ahamove WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
19 prepared
Unescaped Output
3
75 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
6
Bundled Libraries
0

SQL Query Safety

83% prepared23 total queries

Output Escaping

96% escaped78 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
estimate_fee_handler (class\ajax.php:41)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
8 unprotected

Ahamove WooCommerce Attack Surface

Entry Points8
Unprotected8

AJAX Handlers 8

authwp_ajax_aha_admin_update_shipping_method_districtclass\ajax.php:7
noprivwp_ajax_aha_admin_update_shipping_method_districtclass\ajax.php:8
authwp_ajax_aha_admin_update_shipping_method_wardclass\ajax.php:11
noprivwp_ajax_aha_admin_update_shipping_method_wardclass\ajax.php:12
authwp_ajax_create_order_handlerclass\ajax.php:14
noprivwp_ajax_create_order_handlerclass\ajax.php:15
authwp_ajax_estimate_fee_handlerclass\ajax.php:17
noprivwp_ajax_estimate_fee_handlerclass\ajax.php:18
WordPress Hooks 6
actionadd_meta_boxesclass\custom-fields.php:6
actionwoocommerce_update_options_shipping_ghst_shippingclass\shipping-method-ghst.php:22
actionplugins_loadedghst-woo.php:31
actionafter_setup_themeghst-woo.php:32
actionadmin_enqueue_scriptsghst-woo.php:37
actionwoocommerce_shipping_methodsghst-woo.php:38
Maintenance & Trust

Ahamove WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedDec 26, 2022
PHP min version
Downloads861

Community Trust

Rating0/100
Number of ratings0
Active installs10
Alternatives

Ahamove WooCommerce Alternatives

Shipping Viet Nam WooCommerce

Shipping Viet Nam WooCommerce

shipping-viet-nam-woocommerce

A
85

Plugin hỗ trợ toàn diện giao vận tại Việt Nam cho WooCommerce. Khách hàng chủ động chọn đơn vị giao vận và các gói giao vận ( Nhanh, Chuẩn, Tiết Kiệm ) tuỳ theo hầu bao của mình, việc này tạo sự tin tưởng cho người mua vì công khai chi phí ship giúp tăng tỉ lệ đặt hàng cho quản trị shop. Quản trị shop dễ dàng đăng vận đơn lên các đơn vị giao vận tuỳ theo lựa chọn của khách hàng khi đặt hàng chỉ với 1 Click, cùng với đó là tra cứu trạng thái vận đơn ngay từ trang quản trị.

200 No CVEs
Vietnam Checkout for WooCommerce

Vietnam Checkout for WooCommerce

woo-vietnam-checkout

A
98

Vietnam Checkout for WooCommerce - Thêm Tỉnh/Thành phố, Phường/Xã vào form checkout của Woo và tối giản form checkout cho phù hợp với Việt Nam

10K 4 CVEs
Multi-Step Checkout for WooCommerce

Multi-Step Checkout for WooCommerce

wp-multi-step-checkout

A
99

Split the different sections of the default WooCommerce checkout page into multiple steps. Allow your customers a faster and easier checkout process.

8K 1 CVE
Magical Shop Builder – WooCommerce Template Builder for Elementor | Shop, Cart, Checkout & Product Page Builder

Magical Shop Builder – WooCommerce Template Builder for Elementor | Shop, Cart, Checkout & Product Page Builder

magical-products-display

A
99

The complete WooCommerce Shop Builder for Elementor. Build custom single product pages, cart, checkout, my account & shop archives with 60+ widgets.

3K 1 CVE
Comunas de Chile para WooCommerce

Comunas de Chile para WooCommerce

comunas-de-chile-para-woocommerce

A
100

Agrega las Comunas de Chile a WooCommerce para mejorar la experiencia de envío.

2K No CVEs
Developer Profile

Ahamove WooCommerce Developer Profile

Mèo Lửa

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Ahamove WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/giao-hang-sieu-toc/assets/css/admin.css/wp-content/plugins/giao-hang-sieu-toc/assets/js/admin.js
Script Paths
/wp-content/plugins/giao-hang-sieu-toc/assets/js/admin.js
Version Parameters
ghst-admin1.0.0

HTML / DOM Fingerprints

Data Attributes
ghst_shippingghst_admin_params
JS Globals
ghst_admin_params
REST Endpoints
/wp-json/ghstwoo/
FAQ

Frequently Asked Questions about Ahamove WooCommerce