Ship Estimate for WooCommerce Security & Risk Analysis

wordpress.org/plugins/wc-ship-est

Add a Delivery Estimate or Shipping Method Description to the WooCommerce Cart with a simple, fast and lightweight plugin.

100 active installs v2.1.11 PHP + WP 6.6+ Updated Jan 10, 2026
backorderdelivery-estimategoogle-reviewsship-datewoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ship Estimate for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

Ship Estimate for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "wc-ship-est" plugin v2.1.11 exhibits a generally good security posture with a low attack surface and a commendable use of prepared statements for SQL queries. The plugin also implements capability checks and nonce checks, which are vital for protecting against common WordPress vulnerabilities. However, the static analysis reveals a significant concern: the presence of the `unserialize` function, which is known to be a potential vector for remote code execution if user-controlled data is passed to it without proper sanitization. This, combined with a taint analysis flow with unsanitized paths, indicates a potential risk that requires careful investigation and mitigation.

The plugin's clean vulnerability history with no recorded CVEs is a strong positive signal, suggesting that the developers have a history of producing secure code or have been diligent in addressing any past issues. Despite this positive history, the identified `unserialize` function and the tainted flow highlight an area where the plugin's security could be further strengthened. Therefore, while the plugin appears to be relatively secure based on its history and overall implementation of security best practices, the specific findings in the static analysis warrant attention to prevent potential exploitation.

Key Concerns

  • Presence of unserialize function
  • Flows with unsanitized paths
  • Low percentage of properly escaped output
Vulnerabilities
None known

Ship Estimate for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Ship Estimate for WooCommerce Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
1 prepared
Unescaped Output
85
41 escaped
Nonce Checks
2
Capability Checks
3
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$method_title=unserialize($m->meta)['title'];wse_functions.php:311

SQL Query Safety

100% prepared1 total queries

Output Escaping

33% escaped126 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
wse_adminMenu (wse_functions.php:139)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Ship Estimate for WooCommerce Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[display_ship_est] wse_functions.php:1527
[wse_prd_estimate] wse_functions.php:1531
WordPress Hooks 13
actionactivated_pluginwse_functions.php:25
actionadmin_noticeswse_functions.php:87
actionadmin_initwse_functions.php:89
actionbefore_woocommerce_initwse_functions.php:107
actionadmin_menuwse_functions.php:1122
actionwoocommerce_initwse_functions.php:1519
actionwp_footerwse_functions.php:1519
actionwoocommerce_before_add_to_cart_formwse_functions.php:1530
actionadmin_footerwse_functions.php:1658
actionadmin_headwse_functions.php:1678
actionwoocommerce_email_before_order_tablewse_functions.php:1695
filterwoocommerce_email_format_stringwse_functions.php:1706
actionwp_footerwse_functions.php:1744
Maintenance & Trust

Ship Estimate for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 10, 2026
PHP min version
Downloads15K

Community Trust

Rating98/100
Number of ratings8
Active installs100
Developer Profile

Ship Estimate for WooCommerce Developer Profile

RLDD

8 plugins · 5K total installs

93
trust score
Avg Security Score
99/100
Avg Patch Time
8 days
View full developer profile
Detection Fingerprints

How We Detect Ship Estimate for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wc-ship-est/js/wse_checkout.js/wp-content/plugins/wc-ship-est/css/wse_checkout.css/wp-content/plugins/wc-ship-est/js/wse_admin.js/wp-content/plugins/wc-ship-est/css/wse_admin.css
Script Paths
/wp-content/plugins/wc-ship-est/js/wse_checkout.js/wp-content/plugins/wc-ship-est/js/wse_admin.js
Version Parameters
wc-ship-est/js/wse_checkout.js?ver=wc-ship-est/css/wse_checkout.css?ver=wc-ship-est/js/wse_admin.js?ver=wc-ship-est/css/wse_admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
wse-admin-noticewse-admin-settings-container
HTML Comments
<!-- Ship Estimate Options Start --><!-- Ship Estimate Options End -->
Data Attributes
data-wse-method-iddata-wse-option-key
JS Globals
wse_checkout_paramswse_admin_params
FAQ

Frequently Asked Questions about Ship Estimate for WooCommerce