
ingenidev CashOnDelivery Shield Security & Risk Analysis
wordpress.org/plugins/ingenidev-cashondelivery-shieldNo more fake Cash on Delivery (COD) orders! Disables COD for anonymous users/guests. Logged in users can pay. Just install, no configuration needed.
Is ingenidev CashOnDelivery Shield Safe to Use in 2026?
Generally Safe
Score 100/100ingenidev CashOnDelivery Shield has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "ingenidev-cashondelivery-shield" plugin version 1.0.7 exhibits a mixed security posture. On the positive side, the code analysis reveals no dangerous functions, all SQL queries utilize prepared statements, and output is properly escaped. There are also no recorded vulnerabilities or CVEs for this plugin, indicating a potentially stable and well-maintained codebase in terms of past security issues. The absence of file operations and external HTTP requests also limits potential attack vectors.
However, a significant concern arises from the static analysis, which identifies a single AJAX handler without any authentication checks. This creates a direct, unprotected entry point into the plugin's functionality. While taint analysis shows no unsanitized flows, the lack of authorization on this AJAX handler means that any unauthenticated user could potentially trigger its execution, leading to unintended consequences or even exploitation if the handler performs sensitive operations. The plugin also lacks nonce checks on its AJAX handler, further increasing the risk of Cross-Site Request Forgery (CSRF) attacks.
In conclusion, while the plugin benefits from robust practices in SQL querying and output escaping, and has a clean vulnerability history, the presence of an unprotected AJAX entry point is a critical weakness. This single unprotected point of interaction poses a substantial risk, especially given the lack of nonce protection. It is crucial to address this unprotected AJAX handler by implementing proper authentication and authorization checks to secure the plugin effectively.
Key Concerns
- Unprotected AJAX handler
- Missing nonce checks on AJAX
ingenidev CashOnDelivery Shield Security Vulnerabilities
ingenidev CashOnDelivery Shield Code Analysis
ingenidev CashOnDelivery Shield Attack Surface
AJAX Handlers 1
WordPress Hooks 3
Maintenance & Trust
ingenidev CashOnDelivery Shield Maintenance & Trust
Maintenance Signals
Community Trust
ingenidev CashOnDelivery Shield Alternatives
Smart COD for WooCommerce
wc-smart-cod
All the COD restrictions and extra fees you'll ever need, in a single plugin.
PiWeb Disable payment method / Partial payment for WooCommerce
disable-payment-method-for-woocommerce
Disable payment method for WooCommerce, Charge WooCommerce Payment processing FEES, Take Partial payment for Order, Advance COD or Partial payment for …
Risk Free Cash On Delivery (COD) – WooCommerce
risk-free-cash-on-delivery-cod-woocommerce
This plugin secures your Cash on delivery orders with an advance Payment option, with an additional feature of Extra fees and Restrictions.
WooBooster Partial COD for WooCommerce
wb-partial-cod-for-woocommerce
Best Wordpress plugin to Allows you to take partial payment via Cash on Delivery (COD) in WooCommerce.
PCOD – Partial COD, Payment Gateway Restrictions & Fees | for WooCommerce
partial-cod-payment-gateway-restrictions-fees
Advanced Partial COD, Payment Method Restrictions, Cart Fees & Cart Discounts for WooCommerce
ingenidev CashOnDelivery Shield Developer Profile
11 plugins · 1K total installs
How We Detect ingenidev CashOnDelivery Shield
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/ingenidev-cashondelivery-shield/js/ingenidev_cods_dismiss_notice.js/wp-content/plugins/ingenidev-cashondelivery-shield/js/ingenidev_cods_dismiss_notice.jsingenidev-cashondelivery-shield/js/ingenidev_cods_dismiss_notice.js?ver=HTML / DOM Fingerprints
ingenidev-welcome-noticeid="ingenidev-welcome-notice"id="ingenidev-dismiss-notice"ingenidev_cods_ajax_obj