Open One On Demand Delivery Security & Risk Analysis

wordpress.org/plugins/open-one-on-demand-delivery

Open One On Demand Delivery is used to link a store developed in WooCommerce with the Open One API and in this way have a delivery system connected to …

0 active installs v2.1.3 PHP 7.0+ WP 5.3+ Updated Aug 3, 2021
apideliverye-commerceopenonewoo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Open One On Demand Delivery Safe to Use in 2026?

Generally Safe

Score 85/100

Open One On Demand Delivery has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "open-one-on-demand-delivery" plugin v2.1.3 presents a mixed security posture. On the positive side, the plugin exhibits excellent practices regarding SQL queries, exclusively using prepared statements, and shows no history of known vulnerabilities (CVEs). The static analysis also indicates a lack of dangerous functions, file operations, and external HTTP requests, which are common vectors for exploits. However, significant concerns arise from the output escaping and taint analysis. With only 20% of outputs properly escaped, there is a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the site. Furthermore, the taint analysis revealing two flows with unsanitized paths, although not rated as critical or high, suggests potential for insecure data handling. The absence of nonce checks and capability checks on AJAX handlers and REST API routes (if any were present) further exacerbates these risks, as it implies that unauthenticated or low-privileged users might be able to trigger certain actions or access sensitive information. The lack of any recorded vulnerabilities historically, while positive, could also imply that the plugin hasn't been subjected to extensive security testing or that previous issues were not publicly disclosed. Overall, while the plugin avoids some common pitfalls, the poor output escaping and unsanitized data flows are significant weaknesses that require immediate attention.

Key Concerns

  • Low percentage of properly escaped output
  • Taint flows with unsanitized paths found
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

Open One On Demand Delivery Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Open One On Demand Delivery Release Timeline

v2.2
v2.1
v2.0
v1.2
v1.1
Code Analysis
Analyzed Mar 17, 2026

Open One On Demand Delivery Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
4
Bundled Libraries
0

Output Escaping

20% escaped15 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
ooodd_custom_metabox_content (include\openone-metabox.php:9)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Open One On Demand Delivery Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionwoocommerce_shipping_initinclude\calculate-delivery-fee.php:135
filterwoocommerce_shipping_methodsinclude\calculate-delivery-fee.php:138
actionwoocommerce_checkout_update_order_reviewinclude\calculate-delivery-fee.php:148
actionadd_meta_boxesinclude\openone-metabox.php:3
actionwoocommerce_order_status_processinginclude\request-driver.php:3
actionadmin_enqueue_scriptsopenone.php:12
actionwp_enqueue_scriptsopenone.php:20
actionadmin_menuopenone.php:26
actionadmin_initopenone.php:39
Maintenance & Trust

Open One On Demand Delivery Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedAug 3, 2021
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Open One On Demand Delivery Developer Profile

openonetech

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Open One On Demand Delivery

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/open-one-on-demand-delivery/assets/css/openone.css/wp-content/plugins/open-one-on-demand-delivery/assets/js/openone.js
Script Paths
/wp-content/plugins/open-one-on-demand-delivery/assets/js/openone.js
Version Parameters
open-one-on-demand-delivery/assets/css/openone.css?ver=open-one-on-demand-delivery/assets/js/openone.js?ver=

HTML / DOM Fingerprints

CSS Classes
open-input
Data Attributes
openone_apikeyopenone_secretkeyopenone_date_fromopenone_date_toopenone_store_selectedopenone_check_selected+3 more
FAQ

Frequently Asked Questions about Open One On Demand Delivery