Teezily plus for WooCommerce Security & Risk Analysis

wordpress.org/plugins/teezily-plus-shipping-method

Teezily Plus is a complete print on demand fulfillment service.

0 active installs v0.1.0 PHP + WP 3.8+ Updated Sep 15, 2022
drop-shippingprint-on-demandprintingteezily-pluswoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Teezily plus for WooCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

Teezily plus for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The static analysis of the 'teezily-plus-shipping-method' plugin version 0.1.0 indicates a generally strong security posture based on the provided data. There are no identified dangerous functions, all SQL queries use prepared statements, and all outputs are properly escaped. The absence of file operations and critical taint flows further strengthens this. However, a significant concern is the complete lack of nonce and capability checks, coupled with the presence of an external HTTP request without details on its implementation. This suggests a potential for authorization bypass or data leakage if the external request is not handled securely or if other entry points are discovered. The plugin's vulnerability history, showing zero recorded CVEs, is positive but might also indicate a lack of thorough historical security auditing for this specific version or a very limited attack surface that hasn't yet been targeted.

While the current analysis reveals a low direct risk from discovered code signals, the foundational security mechanisms like nonces and capability checks are entirely missing. This represents a significant oversight that could be exploited if other, as yet unidentified, entry points exist or if the external HTTP request is compromised. The lack of identified entry points is a good sign, but it's important to acknowledge that static analysis may not always uncover all potential attack vectors. The plugin's strengths lie in its internal code hygiene regarding SQL and output, but its weaknesses are in its fundamental authorization and external interaction handling.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • External HTTP request without details
Vulnerabilities
None known

Teezily plus for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Teezily plus for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0
Attack Surface

Teezily plus for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwoocommerce_load_shipping_methodsincludes\teezilyplus-shipping-method.php:66
filterwoocommerce_shipping_methodsincludes\teezilyplus-shipping-method.php:68
filterwoocommerce_cart_shipping_packagesincludes\teezilyplus-shipping-method.php:70
actionwoocommerce_shipping_initteezilyplus.php:21
Maintenance & Trust

Teezily plus for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedSep 15, 2022
PHP min version
Downloads695

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Teezily plus for WooCommerce Developer Profile

teezilyplus

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Teezily plus for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Teezily plus for WooCommerce