HyperSell – COD Order Form for WooCommerce Security & Risk Analysis

wordpress.org/plugins/hypersell-cod-order-form

If your business is based on Cash On Delivery, you need HyperSell in your store, it will help you increase your conversion by changing the normal WooC …

10 active installs v1.0.0 PHP 5.0+ WP 4.4+ Updated Oct 26, 2022
codcod-order-formorder-formshopifywoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is HyperSell – COD Order Form for WooCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

HyperSell – COD Order Form for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The hypersell-cod-order-form plugin v1.0.0 presents significant security concerns primarily due to its unprotected AJAX endpoints and a lack of capability checks. While the plugin demonstrates good practices in handling SQL queries with prepared statements and has a high rate of properly escaped output, the presence of two AJAX handlers without any authentication or capability checks creates a substantial attack surface. This means any unauthenticated user could potentially interact with these endpoints, leading to unintended actions or information disclosure if not carefully implemented. The taint analysis reveals two flows with unsanitized paths, though they are not categorized as critical or high severity. This suggests a potential for data manipulation, even if not leading to immediate severe compromise. The plugin's vulnerability history is clean, with no known CVEs. This absence of past vulnerabilities is a positive sign, suggesting either careful development or a lack of prior scrutiny. However, it does not mitigate the immediate risks identified in the static analysis. The overall security posture is weakened by the unprotected entry points, despite the strengths in other areas. A balanced conclusion highlights the clean vulnerability history and good SQL/output handling as positives, but the unprotected AJAX endpoints are a critical weakness that requires immediate attention to improve the plugin's security.

Key Concerns

  • AJAX handlers without auth checks
  • Unsanitized paths in taint flows
  • Missing nonce checks on AJAX
  • Missing capability checks
Vulnerabilities
None known

HyperSell – COD Order Form for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

HyperSell – COD Order Form for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
18 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

Output Escaping

90% escaped20 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
hypersell_create_order (includes\hypersell-core-functions.php:61)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

HyperSell – COD Order Form for WooCommerce Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_hypersell_create_orderincludes\hypersell-core-functions.php:58
noprivwp_ajax_hypersell_create_orderincludes\hypersell-core-functions.php:59
WordPress Hooks 6
actionwp_footerhypersell.php:46
filterplugin_row_metahypersell.php:118
actionadmin_initincludes\class-hypersell-install.php:24
actionadmin_menuincludes\hypersell-core-functions.php:23
actionadmin_footerincludes\hypersell-core-functions.php:35
actionrest_api_initincludes\hypersell-core-functions.php:48
Maintenance & Trust

HyperSell – COD Order Form for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedOct 26, 2022
PHP min version5.0
Downloads2K

Community Trust

Rating20/100
Number of ratings2
Active installs10
Developer Profile

HyperSell – COD Order Form for WooCommerce Developer Profile

volbak

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect HyperSell – COD Order Form for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hypersell-cod-order-form/assets/css/main.css/wp-content/plugins/hypersell-cod-order-form/assets/js/main.js/wp-content/plugins/hypersell-cod-order-form/includes/hypersell-exec.php/wp-content/plugins/hypersell-cod-order-form/includes/class-hypersell.php

HTML / DOM Fingerprints

JS Globals
cartProductscartTotalPricecartCount
FAQ

Frequently Asked Questions about HyperSell – COD Order Form for WooCommerce