
Woo NovaPoshta Shipping Method Security & Risk Analysis
wordpress.org/plugins/woo-novaposhta-shipping-methodWoo Shipping Method "NovaPoshta". Автоматический подсчет стоимости доставки.
Is Woo NovaPoshta Shipping Method Safe to Use in 2026?
Generally Safe
Score 85/100Woo NovaPoshta Shipping Method has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "woo-novaposhta-shipping-method" v1.0.2 plugin exhibits several significant security concerns, primarily stemming from its unprotected entry points. With all three identified AJAX handlers lacking authentication checks, the plugin presents a substantial attack surface that could be exploited by unauthenticated users. This is further exacerbated by the taint analysis, which revealed two high-severity flows with unsanitized paths, indicating potential for command injection or other critical vulnerabilities if user-supplied data is not properly validated and escaped before being used in sensitive operations.
The absence of any recorded historical vulnerabilities in the plugin is a positive indicator, suggesting a potentially stable codebase in that regard. However, this does not negate the immediate risks identified in the static analysis. The fact that 100% of the SQL queries are executed without prepared statements is a serious oversight, leaving the plugin vulnerable to SQL injection attacks. While the output escaping is reasonably good at 67%, the remaining unescaped outputs could still lead to cross-site scripting (XSS) vulnerabilities.
In conclusion, while the plugin has a clean vulnerability history, the current version has critical flaws in its authentication, input sanitization, and SQL query practices. The presence of unprotected AJAX endpoints and unsanitized tainted paths are immediate red flags. The lack of prepared statements for all SQL queries is also a major concern. Until these issues are addressed, the plugin should be considered high risk.
Key Concerns
- Unprotected AJAX handlers
- High severity taint flows with unsanitized paths
- Raw SQL queries without prepared statements
- Missing nonce checks on AJAX handlers
- Missing capability checks on AJAX handlers
- Unescaped output
Woo NovaPoshta Shipping Method Security Vulnerabilities
Woo NovaPoshta Shipping Method Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Woo NovaPoshta Shipping Method Attack Surface
AJAX Handlers 3
WordPress Hooks 12
Maintenance & Trust
Woo NovaPoshta Shipping Method Maintenance & Trust
Maintenance Signals
Community Trust
Woo NovaPoshta Shipping Method Alternatives
WC Hide Shipping Methods
wc-hide-shipping-methods
This plugin automatically hides all other shipping methods when "Free Shipping" is available, while allowing you to retain "Local Picku …
Hide Shipping Method For WooCommerce
hide-shipping-method-for-woocommerce
Allows store owners to hide shipping methods based on specific conditions!
ELEX Hide WooCommerce Shipping Methods
elex-hide-woocommerce-shipping-methods-basic
The ELEX Hide WooCommerce Shipping Methods is a free plugin allows you to hide certain shipping methods based on shipping class, order weight, other e …
bpost shipping
bpost-shipping
This plugin allows customers to choose their preferred Belgian bpost delivery method when ordering in your Woocommerce webshop.
WC Hide Shipping Methods Except Pont
wc-hide-shipping-methods-except-pont
This plugin automatically hides all other shipping methods when “free shipping” is available.
Woo NovaPoshta Shipping Method Developer Profile
1 plugin · 10 total installs
How We Detect Woo NovaPoshta Shipping Method
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/woo-novaposhta-shipping-method/assets/js/novaposhta.js/wp-content/plugins/woo-novaposhta-shipping-method/assets/js/novaposhta.jswoo-novaposhta-shipping-method/assets/js/novaposhta.js?ver=