User role based shipping methods Security & Risk Analysis

wordpress.org/plugins/user-role-based-shipping-method

Display WooCommerce shipping methods based on User Role and Country. Globally compatible.

500 active installs v3.1.0 PHP 7.0+ WP 5.0+ Updated Mar 31, 2024
hide-woocommerce-shipping-methodhide-woocommerce-shipping-method-based-on-user-rolerole-based-shipping-methodshipping-method-based-on-countrywoocommerce-shipping-method
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is User role based shipping methods Safe to Use in 2026?

Generally Safe

Score 85/100

User role based shipping methods has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The static analysis of "user-role-based-shipping-method" v3.1.0 reveals a generally good security posture in terms of attack surface and SQL query handling. The absence of AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points is a significant strength, minimizing potential external exploitation vectors. Furthermore, all SQL queries are properly prepared, mitigating risks of SQL injection vulnerabilities.

However, the analysis does raise concerns regarding output escaping. A substantial portion of output (83%) is not properly escaped, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. Although no direct vulnerabilities were flagged by the taint analysis, the presence of unsanitized paths in two flows indicates potential for unexpected behavior or exploitation if these paths are leveraged in specific ways. The plugin's clean vulnerability history is positive, suggesting past good development practices, but it doesn't negate the current findings.

In conclusion, while the plugin exhibits strengths in its limited attack surface and secure database interactions, the significant unescaped output poses a critical risk that requires immediate attention. The unsanitized paths warrant further investigation to understand their potential impact. Addressing the output escaping issues is paramount to improving the plugin's overall security.

Key Concerns

  • Significant unescaped output (83%)
  • Unsanitized paths in taint analysis (2 flows)
Vulnerabilities
None known

User role based shipping methods Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

User role based shipping methods Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
19
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

17% escaped23 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
save (includes\class-pvalley-user-role-based-shipping-settings.php:136)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

User role based shipping methods Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filterwoocommerce_package_ratesincludes\class-pvalley-user-role-based-shipping-manage-shipping.php:27
filterwoocommerce_package_ratesincludes\class-pvalley-user-role-based-shipping-manage-shipping.php:28
filterwoocommerce_settings_tabs_arrayincludes\class-pvalley-user-role-based-shipping-settings.php:15
actionwoocommerce_admin_field_ph_role_based_rule_matrixincludes\class-pvalley-user-role-based-shipping-settings.php:21
actioninitincludes\class-pvalley-user-role-based-shipping.php:19
actionbefore_woocommerce_initincludes\class-pvalley-user-role-based-shipping.php:23
Maintenance & Trust

User role based shipping methods Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedMar 31, 2024
PHP min version7.0
Downloads11K

Community Trust

Rating88/100
Number of ratings9
Active installs500
Developer Profile

User role based shipping methods Developer Profile

techsarai

1 plugin · 500 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect User role based shipping methods

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/user-role-based-shipping-method/includes/common/PvalleyDropdownOptions.php/wp-content/plugins/user-role-based-shipping-method/includes/PvalleyURBSActionOnShippingMethodType.php/wp-content/plugins/user-role-based-shipping-method/includes/class-pvalley-user-role-based-shipping-common.php/wp-content/plugins/user-role-based-shipping-method/includes/class-pvalley-user-role-based-shipping.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about User role based shipping methods