ShipStation for Ecwid Security & Risk Analysis

wordpress.org/plugins/shipstation-for-ecwid

The plugin helps store owners significantly speed up the shipping process by offering an easy way to seamlessly integrate an Ecwid Store with ShipStat …

20 active installs v2.1 PHP + WP 3.5+ Updated Apr 3, 2014
ecwidfulfillmentshippingshipstation
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ShipStation for Ecwid Safe to Use in 2026?

Generally Safe

Score 85/100

ShipStation for Ecwid has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The 'shipstation-for-ecwid' plugin v2.1 presents a generally good security posture, with no recorded vulnerabilities or known CVEs, indicating a history of stable and secure releases. The static analysis reveals a commendable lack of dangerous functions, raw SQL queries, and external HTTP requests. The presence of a capability check and the use of prepared statements for all SQL queries are strong security practices.

However, there are several areas that warrant attention. The limited output escaping (7%) is a significant concern, potentially opening the door to cross-site scripting (XSS) vulnerabilities. The presence of unsanitized paths in taint analysis, even without a critical or high severity classification, suggests potential weaknesses in how file operations are handled, which could be exploited in certain scenarios. The complete absence of nonce checks, combined with an unknown number of unprotected entry points (though the static analysis reports 0 total entry points, this might be an oversight or depend on how entry points are defined), could be a risk if any future functionality introduces unauthenticated actions.

Overall, while the plugin benefits from a clean vulnerability history and good core security practices like prepared statements, the low percentage of properly escaped output and the findings in taint analysis are definite weaknesses that require addressing to fully secure the plugin.

Key Concerns

  • Low percentage of properly escaped output
  • Taint flows with unsanitized paths found
  • No nonce checks implemented
Vulnerabilities
None known

ShipStation for Ecwid Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

ShipStation for Ecwid Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

ShipStation for Ecwid Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
28
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

7% escaped30 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
write_log (handler.php:258)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

ShipStation for Ecwid Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuecwid-shipstation.php:16
actionparse_requestecwid-shipstation.php:19
Maintenance & Trust

ShipStation for Ecwid Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedApr 3, 2014
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

ShipStation for Ecwid Developer Profile

rtddev

3 plugins · 60 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ShipStation for Ecwid

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/shipstation-for-ecwid/js/script.js
Version Parameters
shipstation-for-ecwid/js/script.js?ver=

HTML / DOM Fingerprints

JS Globals
window.ecwid_ss_tz
REST Endpoints
/ecwid-shipstation-api
FAQ

Frequently Asked Questions about ShipStation for Ecwid