
User role based shipping methods Security & Risk Analysis
wordpress.org/plugins/user-role-based-shipping-methodDisplay WooCommerce shipping methods based on User Role and Country. Globally compatible.
Is User role based shipping methods Safe to Use in 2026?
Generally Safe
Score 85/100User role based shipping methods has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The static analysis of "user-role-based-shipping-method" v3.1.0 reveals a generally good security posture in terms of attack surface and SQL query handling. The absence of AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points is a significant strength, minimizing potential external exploitation vectors. Furthermore, all SQL queries are properly prepared, mitigating risks of SQL injection vulnerabilities.
However, the analysis does raise concerns regarding output escaping. A substantial portion of output (83%) is not properly escaped, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. Although no direct vulnerabilities were flagged by the taint analysis, the presence of unsanitized paths in two flows indicates potential for unexpected behavior or exploitation if these paths are leveraged in specific ways. The plugin's clean vulnerability history is positive, suggesting past good development practices, but it doesn't negate the current findings.
In conclusion, while the plugin exhibits strengths in its limited attack surface and secure database interactions, the significant unescaped output poses a critical risk that requires immediate attention. The unsanitized paths warrant further investigation to understand their potential impact. Addressing the output escaping issues is paramount to improving the plugin's overall security.
Key Concerns
- Significant unescaped output (83%)
- Unsanitized paths in taint analysis (2 flows)
User role based shipping methods Security Vulnerabilities
User role based shipping methods Code Analysis
Output Escaping
Data Flow Analysis
User role based shipping methods Attack Surface
WordPress Hooks 6
Maintenance & Trust
User role based shipping methods Maintenance & Trust
Maintenance Signals
Community Trust
User role based shipping methods Alternatives
User role based shipping methods Developer Profile
1 plugin · 500 total installs
How We Detect User role based shipping methods
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/user-role-based-shipping-method/includes/common/PvalleyDropdownOptions.php/wp-content/plugins/user-role-based-shipping-method/includes/PvalleyURBSActionOnShippingMethodType.php/wp-content/plugins/user-role-based-shipping-method/includes/class-pvalley-user-role-based-shipping-common.php/wp-content/plugins/user-role-based-shipping-method/includes/class-pvalley-user-role-based-shipping.php