WooReer Security & Risk Analysis

wordpress.org/plugins/wcsdm

WooReer calculates shipping rates based on distance via Google Maps, Mapbox, DistanceMatrix.ai, Geoapify, or HERE.

1K active installs v3.1.4 PHP 7.4+ WP 6.4+ Updated Mar 14, 2026
distance-based-shippinggoogle-mapslocal-deliveryshipping-calculatorwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WooReer Safe to Use in 2026?

Generally Safe

Score 100/100

WooReer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The plugin "wcsdm" v3.1.4 demonstrates a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points is a significant strength, indicating a minimal attack surface. Furthermore, the code signals show good practices with 100% of SQL queries using prepared statements and a very high percentage of output being properly escaped. The lack of dangerous functions and file operations also contributes positively to its security. The vulnerability history being completely clear of any CVEs further solidifies its current security standing.

However, there are a few areas that warrant attention. The presence of external HTTP requests, while not inherently a vulnerability, introduces potential risks if the target endpoints are compromised or if the data sent is not handled securely. The limited number of nonce and capability checks, especially given the absence of observed taint flows, might suggest an assumption that no sensitive operations are being performed, or that these checks are implemented elsewhere in a way not captured by this analysis. The lack of identified taint flows is positive, but it's important to remember that static analysis might not uncover all dynamic vulnerabilities.

In conclusion, "wcsdm" v3.1.4 appears to be a well-secured plugin with a robust foundation. Its minimal attack surface and adherence to secure coding practices for SQL and output escaping are commendable. The absence of past vulnerabilities is a significant positive. The primary areas for consideration are the management of external HTTP requests and a potential lack of comprehensive authorization checks that could be a concern if the plugin's functionality evolves to include more sensitive operations.

Key Concerns

  • External HTTP requests present potential risks
  • Limited capability checks found
  • Limited nonce checks found
Vulnerabilities
None known

WooReer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WooReer Release Timeline

v3.1.4Current
v3.1.3
v3.1.2
v3.1.1
v3.1.0
v3.0.4
v3.0.3
v3.0.2
v3.0.1
v3.0.0
v2.2.4
v2.2.3
v2.2.2
v2.2.1
v2.2.0
v2.1.16
v2.1.15
v2.1.14
v2.1.13
v2.1.12
Code Analysis
Analyzed Mar 16, 2026

WooReer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
55 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

Output Escaping

98% escaped56 total outputs
Attack Surface

WooReer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 20
actionwcsdm_validate_optionincludes\api-providers\class-wcsdm-api-provider-distancematrix.php:69
actionwcsdm_validate_optionincludes\api-providers\class-wcsdm-api-provider-geoapify.php:43
actionwcsdm_validate_optionincludes\api-providers\class-wcsdm-api-provider-google.php:63
actionwcsdm_validate_optionincludes\api-providers\class-wcsdm-api-provider-here.php:77
actionwcsdm_validate_optionincludes\api-providers\class-wcsdm-api-provider-mapbox.php:71
actionadmin_footerincludes\classes\class-wcsdm-shipping-method.php:1363
actionplugins_loadedincludes\classes\class-wcsdm.php:95
filterwoocommerce_shipping_methodsincludes\classes\class-wcsdm.php:111
actionadmin_enqueue_scriptsincludes\classes\class-wcsdm.php:119
actionbefore_woocommerce_initincludes\classes\class-wcsdm.php:127
filterrest_pre_dispatchincludes\classes\class-wcsdm.php:136
filterwpincludes\classes\class-wcsdm.php:145
filterwpincludes\classes\class-wcsdm.php:154
actionwoocommerce_shipping_zone_method_addedincludes\classes\class-wcsdm.php:163
filterwcsdm_validate_address_field_address_1includes\classes\class-wcsdm.php:418
filterwcsdm_validate_address_field_address_2includes\classes\class-wcsdm.php:419
filterwcsdm_validate_address_field_address_1includes\classes\class-wcsdm.php:442
filterwcsdm_validate_address_field_address_2includes\classes\class-wcsdm.php:443
filterwcsdm_validate_address_field_address_1includes\classes\class-wcsdm.php:462
filterwcsdm_validate_address_field_address_2includes\classes\class-wcsdm.php:463
Maintenance & Trust

WooReer Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 14, 2026
PHP min version7.4
Downloads53K

Community Trust

Rating86/100
Number of ratings23
Active installs1K
Developer Profile

WooReer Developer Profile

Sofyan Sitorus

6 plugins · 1K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WooReer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wcsdm/assets/css/backend.css/wp-content/plugins/wcsdm/assets/js/backend.js
Script Paths
/wp-content/plugins/wcsdm/assets/js/backend.js

HTML / DOM Fingerprints

CSS Classes
wcsdm-shipping-method-settings
HTML Comments
<!-- WooReer shipping method settings --><!-- Initialized by WooReer plugin -->
Data Attributes
data-plugin-path="wcsdm"data-wcsdm-version="3.1.4"
JS Globals
window.wcsdm_backend_params
REST Endpoints
/wp-json/wcsdm/v1/shipping
FAQ

Frequently Asked Questions about WooReer