ShipWorks Connector for Woocommerce Security & Risk Analysis

wordpress.org/plugins/shipworks-e-commerce-bridge

Our plugin ShipWorks Connector allows Woocommerce to synchronize with Shipworks.

300 active installs v5.3.2 PHP + WP 3.0.1+ Updated Feb 18, 2026
order-managershipping-managershipworkswoocommercewoocommerce-shipping
99
A · Safe
CVEs total1
Unpatched0
Last CVEJan 17, 2025
Safety Verdict

Is ShipWorks Connector for Woocommerce Safe to Use in 2026?

Generally Safe

Score 99/100

ShipWorks Connector for Woocommerce has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jan 17, 2025Updated 1mo ago
Risk Assessment

The "shipworks-e-commerce-bridge" v5.3.2 plugin exhibits a mixed security posture. While it boasts a clean attack surface with zero identified AJAX handlers, REST API routes, shortcodes, or cron events without authentication or permission checks, and no known unpatched CVEs, significant concerns arise from its code quality. The presence of 20 dangerous "unserialize" functions, coupled with a very low rate of prepared SQL statements (1%) and only 16% of outputs being properly escaped, indicates a high potential for vulnerabilities. The taint analysis, although limited in scope with only 3 flows analyzed, revealed 2 flows with unsanitized paths, hinting at potential injection or path traversal issues that could be exploited if they interact with other weak points.

The plugin's vulnerability history, with one medium-severity CVE in the past related to Cross-Site Request Forgery (CSRF), suggests a pattern of past security oversights. While the absence of unpatched critical or high vulnerabilities is positive, the recurring nature of past security issues and the current code quality concerns necessitate caution. The plugin's strengths lie in its limited direct attack surface and lack of unpatched vulnerabilities, but these are overshadowed by significant code-level risks related to insecure function usage, poor SQL sanitization, and insufficient output escaping, which collectively present a considerable security risk.

Key Concerns

  • Numerous dangerous unserialize functions detected
  • Very low rate of prepared SQL statements
  • Low percentage of properly escaped output
  • Two unsanitized paths found in taint analysis
  • One medium severity CVE in vulnerability history
  • Only one nonce check found
  • Zero capability checks found
Vulnerabilities
1

ShipWorks Connector for Woocommerce Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-13317medium · 4.3Cross-Site Request Forgery (CSRF)

ShipWorks Connector for Woocommerce <= 5.2.5 - Cross-Site Request Forgery to Service Password/Username Update

Jan 17, 2025 Patched in 5.2.6 (1d)
Code Analysis
Analyzed Mar 16, 2026

ShipWorks Connector for Woocommerce Code Analysis

Dangerous Functions
20
Raw SQL Queries
147
1 prepared
Unescaped Output
158
30 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

Dangerous Functions Found

unserialize$object = unserialize( $result['meta_value'] );functions\jigoshop\functionsJigoshop.php:7
unserialize$result = unserialize( $result['meta_value'] );functions\jigoshop\functionsJigoshop.php:49
unserialize$result = unserialize( $result['option_value'] );functions\jigoshop\functionsJigoshop.php:61
unserialize$weight = unserialize($results['value']);functions\shopp\functionsShopp.php:20
unserialize$obj = unserialize( $row['value'] );functions\shopp\functionsShopp.php:151
unserialize$obj = unserialize( $row['value'] );functions\shopp\functionsShopp.php:169
unserialize$obj = unserialize( $row['value'] );functions\shopp\functionsShopp.php:179
unserialize$tab = unserialize( $str );functions\shopp\functionsShopp.php:224
unserialize$tab = unserialize( $string );functions\shopp\functionsShopp.php:279
unserialize$tab = unserialize( $str );functions\woocommerce\functionsWoocommerce.php:226
unserialize$data = unserialize($row['meta_value']);functions\wpecommerce\functionsWPeCommerce.php:30
unserialize$subscription_products = unserialize( $row['meta_value'] );model\Item.class.php:146
unserialize$object = unserialize( getProductInfo_adv( $variationId, 'order_items' ) );model\Item.class.php:411
unserialize$object = unserialize( getProductInfo_adv( $variationId, 'variation_data' ) );model\Item.class.php:418
unserialize$content = unserialize( $note['value'] );model\Order.class.php:311
unserialize$smartCoupons = unserialize(getInformation( $this->row, 'smart_coupons_contribution' ));model\Order.class.php:568
unserialize$fields = unserialize( $row["option_value"] );model\Order.class.php:735
unserialize$fields = unserialize( $row["option_value"] );model\Order.class.php:764
unserialize$object = unserialize( $result['meta_value'] );model\Order.class.php:974
unserialize$statusCodes = unserialize( $row['value'] );model\StatusCodes.class.php:80

SQL Query Safety

1% prepared148 total queries

Output Escaping

16% escaped188 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
<controlAdmin> (control\controlAdmin.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

ShipWorks Connector for Woocommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menucontroler.php:29
actionplugins_loadedcontroler.php:59
actionbefore_woocommerce_initcontroler.php:61
actionwp_loadedcontroler.php:67
actionadmin_noticesview\fillSettings.php:11
actionadmin_noticesview\noticeErrorXml.php:11
actionadmin_noticesview\noticeFailedPayement.php:14
Maintenance & Trust

ShipWorks Connector for Woocommerce Maintenance & Trust

Maintenance Signals

WordPress version tested7.0.0
Last updatedFeb 18, 2026
PHP min version
Downloads44K

Community Trust

Rating96/100
Number of ratings10
Active installs300
Developer Profile

ShipWorks Connector for Woocommerce Developer Profile

AdvancedCreation

1 plugin · 300 total installs

99
trust score
Avg Security Score
99/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect ShipWorks Connector for Woocommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/shipworks-e-commerce-bridge/css/admin.css/wp-content/plugins/shipworks-e-commerce-bridge/css/bootstrap.min.css/wp-content/plugins/shipworks-e-commerce-bridge/css/bootstrap.min.js
Script Paths
/wp-content/plugins/shipworks-e-commerce-bridge/css/bootstrap.min.js
Version Parameters
shipworks-e-commerce-bridge/css/admin.css?ver=shipworks-e-commerce-bridge/css/bootstrap.min.css?ver=shipworks-e-commerce-bridge/css/bootstrap.min.js?ver=

HTML / DOM Fingerprints

CSS Classes
shipworks-connector
HTML Comments
ShipWorks ConnectorAdvancedCreation
Data Attributes
shipworks-wordpress
FAQ

Frequently Asked Questions about ShipWorks Connector for Woocommerce