
Shesha by The Courier Guy Security & Risk Analysis
wordpress.org/plugins/the-courier-guy-shipping-for-sovtechThis is the official WooCommerce extension to ship products using Shesha by The Courier Guy.
Is Shesha by The Courier Guy Safe to Use in 2026?
Generally Safe
Score 85/100Shesha by The Courier Guy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin "the-courier-guy-shipping-for-sovtech" v1.0.0 exhibits a mixed security posture. While it demonstrates good practices in database query handling with 100% prepared statements and a high rate of proper output escaping (97%), it presents significant security concerns due to its unprotected entry points and reliance on potentially dangerous functions.
The primary risks stem from the presence of two AJAX handlers that lack authentication checks. This directly translates to an exposed attack surface where unauthenticated users could potentially trigger sensitive actions. Furthermore, the use of `ini_set` and `unserialize` are flagged as dangerous functions, which, if not handled with extreme care and robust input validation, can lead to serious vulnerabilities like arbitrary code execution or denial-of-service attacks. The taint analysis, while reporting no critical or high-severity flows, analyzed a limited number of flows (5) and found all of them to have unsanitized paths, which is concerning despite the absence of critical issues.
The plugin's vulnerability history is clean, with no recorded CVEs. This absence of known exploits could indicate either a lack of widespread targeting or a history of responsible development. However, it does not negate the immediate risks identified in the static and taint analysis. In conclusion, while the plugin has strengths in its database interaction and output handling, the unprotected AJAX endpoints and the use of dangerous functions introduce significant risks that require immediate attention and mitigation.
Key Concerns
- Unprotected AJAX handlers
- Use of dangerous function: unserialize
- Use of dangerous function: ini_set
- Flows with unsanitized paths
- Lack of capability checks
Shesha by The Courier Guy Security Vulnerabilities
Shesha by The Courier Guy Release Timeline
Shesha by The Courier Guy Code Analysis
Dangerous Functions Found
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
Shesha by The Courier Guy Attack Surface
AJAX Handlers 2
WordPress Hooks 58
Maintenance & Trust
Shesha by The Courier Guy Maintenance & Trust
Maintenance Signals
Community Trust
Shesha by The Courier Guy Alternatives
No alternatives data available yet.
Shesha by The Courier Guy Developer Profile
3 plugins · 3K total installs
How We Detect Shesha by The Courier Guy
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/the-courier-guy-shipping-for-sovtech/Assets/css/style.css/wp-content/plugins/the-courier-guy-shipping-for-sovtech/Assets/js/script.js/wp-content/plugins/the-courier-guy-shipping-for-sovtech/Includes/ls-framework-custom/Assets/css/customplugin.css/wp-content/plugins/the-courier-guy-shipping-for-sovtech/Includes/ls-framework-custom/Assets/js/customplugin.js/wp-content/plugins/the-courier-guy-shipping-for-sovtech/Assets/js/script.js/wp-content/plugins/the-courier-guy-shipping-for-sovtech/Includes/ls-framework-custom/Assets/js/customplugin.jsthe-courier-guy-shipping-for-sovtech/Assets/css/style.css?ver=the-courier-guy-shipping-for-sovtech/Assets/js/script.js?ver=HTML / DOM Fingerprints
dimative-shipping-instance-form-fields-filters exit if accessed directly Abort if WooCommerce not installed change default TODO: due to template_redirect action, Postcode might show up after refresh +14 moredata-field-iddata-field-typedata-requiredCSM_CheckoutCSM_Init