OTO – Shipping Gateway Security & Risk Analysis

wordpress.org/plugins/oto-shipping-gateway

Ship, manage, track, and return your orders with trusted shipping carriers across MENA and Turkey! Privacy Policy: https://tryoto.com/privacy-policy/

80 active installs v1.0.6 PHP 7.4+ WP 6.5+ Updated Jan 29, 2026
ksalogisticssaudi-arabiashippingwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is OTO – Shipping Gateway Safe to Use in 2026?

Generally Safe

Score 100/100

OTO – Shipping Gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "oto-shipping-gateway" v1.0.6 plugin exhibits a generally strong security posture based on the provided static analysis. The complete absence of identified dangerous functions, raw SQL queries without prepared statements, and taint analysis flows with unsanitized paths are significant strengths. The plugin also demonstrates good practices by utilizing nonces and capability checks, albeit only once each, and has a history free of any known vulnerabilities. The fact that there are no recorded CVEs, and none are currently unpatched, further reinforces a positive security outlook.

However, there are a few areas that warrant attention. While the attack surface is reported as zero entry points, this might be a simplification if certain internal functions or hooks are not captured by the analysis. The external HTTP requests, although not specified in terms of their purpose or validation, could potentially introduce risks if not handled securely. The output escaping, while at 85%, means that 15% of outputs are not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is involved in those unescaped outputs. The limited use of nonce and capability checks (once each) suggests potential for broader application of these security measures.

In conclusion, "oto-shipping-gateway" v1.0.6 appears to be a relatively secure plugin with no critical or high-risk vulnerabilities identified. The development team has clearly prioritized secure coding practices concerning data manipulation and input sanitization. The primary areas for improvement lie in ensuring 100% output escaping and potentially expanding the use of authentication and authorization checks to cover all interactions, especially if any subtle attack vectors exist that weren't detected. The lack of historical vulnerabilities is a very positive indicator.

Key Concerns

  • Unescaped output detected
  • Limited use of nonce checks
  • Limited use of capability checks
Vulnerabilities
None known

OTO – Shipping Gateway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

OTO – Shipping Gateway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
8
44 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
4
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

85% escaped52 total outputs
Attack Surface

OTO – Shipping Gateway Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
actionadmin_initincludes\admin\class-wkwptoc-admin-hooks.php:44
actionadmin_menuincludes\admin\class-wkwptoc-admin-hooks.php:45
filterwoocommerce_screen_idsincludes\admin\class-wkwptoc-admin-hooks.php:46
actionadmin_enqueue_scriptsincludes\admin\class-wkwptoc-admin-hooks.php:47
actionoto-shipping-gateway_contentincludes\admin\class-wkwptoc-admin-hooks.php:49
actionplugins_loadedincludes\class-wktryoto-oms-connector.php:75
actionadmin_noticesincludes\class-wktryoto-oms-connector.php:90
actionbefore_woocommerce_initincludes\class-wktryoto-oms-connector.php:133
actionbefore_woocommerce_initincludes\class-wktryoto-oms-connector.php:152
filterwoocommerce_webhook_topicsincludes\class-wkwptoc-webhook-handler.php:42
filterwoocommerce_valid_webhook_eventsincludes\class-wkwptoc-webhook-handler.php:43
filterwoocommerce_webhook_topic_hooksincludes\class-wkwptoc-webhook-handler.php:44
actionwoocommerce_order_status_changedincludes\class-wkwptoc-webhook-handler.php:45
filterwoocommerce_webhook_payloadincludes\class-wkwptoc-webhook-handler.php:46
Maintenance & Trust

OTO – Shipping Gateway Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJan 29, 2026
PHP min version7.4
Downloads480

Community Trust

Rating0/100
Number of ratings0
Active installs80
Developer Profile

OTO – Shipping Gateway Developer Profile

otoglobal

2 plugins · 90 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect OTO – Shipping Gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/oto-shipping-gateway/assets/css/oto-shipping-gateway-backend.css/wp-content/plugins/oto-shipping-gateway/assets/js/oto-shipping-gateway-backend.js
Script Paths
/wp-content/plugins/oto-shipping-gateway/assets/js/oto-shipping-gateway-backend.js
Version Parameters
oto-shipping-gateway/assets/css/oto-shipping-gateway-backend.css?ver=oto-shipping-gateway/assets/js/oto-shipping-gateway-backend.js?ver=

HTML / DOM Fingerprints

CSS Classes
wkwptoc-settings-groupwkwptoc-confuguration-tmpl
HTML Comments
<!-- Exit if access directly. --><!-- File handler class --><!-- Instance variable --><!-- Template handler class object. -->+10 more
Data Attributes
name="_wkwptoc_oto_username"name="_wkwptoc_oto_password"name="_wkwptoc_store_name"name="_wkwptoc_oto_otp"name="_wkwptoc_oto_environment"data-settings-group="wkwptoc-settings-group"+1 more
JS Globals
window.wkwptoc_ajax_object
FAQ

Frequently Asked Questions about OTO – Shipping Gateway