Woo NovaPoshta Shipping Method Security & Risk Analysis

wordpress.org/plugins/woo-novaposhta-shipping-method

Woo Shipping Method "NovaPoshta". Автоматический подсчет стоимости доставки.

10 active installs v1.0.2 PHP + WP 4.2.4+ Updated Nov 4, 2015
novaposhtashippingshipping-methodswoowoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Woo NovaPoshta Shipping Method Safe to Use in 2026?

Generally Safe

Score 85/100

Woo NovaPoshta Shipping Method has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "woo-novaposhta-shipping-method" v1.0.2 plugin exhibits several significant security concerns, primarily stemming from its unprotected entry points. With all three identified AJAX handlers lacking authentication checks, the plugin presents a substantial attack surface that could be exploited by unauthenticated users. This is further exacerbated by the taint analysis, which revealed two high-severity flows with unsanitized paths, indicating potential for command injection or other critical vulnerabilities if user-supplied data is not properly validated and escaped before being used in sensitive operations.

The absence of any recorded historical vulnerabilities in the plugin is a positive indicator, suggesting a potentially stable codebase in that regard. However, this does not negate the immediate risks identified in the static analysis. The fact that 100% of the SQL queries are executed without prepared statements is a serious oversight, leaving the plugin vulnerable to SQL injection attacks. While the output escaping is reasonably good at 67%, the remaining unescaped outputs could still lead to cross-site scripting (XSS) vulnerabilities.

In conclusion, while the plugin has a clean vulnerability history, the current version has critical flaws in its authentication, input sanitization, and SQL query practices. The presence of unprotected AJAX endpoints and unsanitized tainted paths are immediate red flags. The lack of prepared statements for all SQL queries is also a major concern. Until these issues are addressed, the plugin should be considered high risk.

Key Concerns

  • Unprotected AJAX handlers
  • High severity taint flows with unsanitized paths
  • Raw SQL queries without prepared statements
  • Missing nonce checks on AJAX handlers
  • Missing capability checks on AJAX handlers
  • Unescaped output
Vulnerabilities
None known

Woo NovaPoshta Shipping Method Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Woo NovaPoshta Shipping Method Code Analysis

Dangerous Functions
0
Raw SQL Queries
10
0 prepared
Unescaped Output
7
14 escaped
Nonce Checks
0
Capability Checks
0
File Operations
4
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared10 total queries

Output Escaping

67% escaped21 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
getCitiesByAreaCodeAjax (hooks.php:70)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
3 unprotected

Woo NovaPoshta Shipping Method Attack Surface

Entry Points3
Unprotected3

AJAX Handlers 3

noprivwp_ajax_np_api_search_citieshooks.php:12
authwp_ajax_np_api_search_citieshooks.php:13
authwp_ajax_np_api_get_cities_by_areahooks.php:90
WordPress Hooks 12
actionwoocommerce_shipping_inithooks.php:3
filterwoocommerce_shipping_methodshooks.php:10
filterwoocommerce_stateshooks.php:92
filterwoocommerce_shipping_calculator_enable_cityhooks.php:108
filterwoocommerce_locate_templatehooks.php:110
filterwoocommerce_checkout_fieldshooks.php:137
filterwoocommerce_billing_fieldshooks.php:173
actionwp_enqueue_scriptshooks.php:179
filterwoocommerce_order_formatted_billing_addresshooks.php:201
filterwoocommerce_order_formatted_shipping_addresshooks.php:202
actionadmin_enqueue_scriptswoo-novaposhta-shipping.php:48
actionwp_enqueue_scriptswoo-novaposhta-shipping.php:49
Maintenance & Trust

Woo NovaPoshta Shipping Method Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedNov 4, 2015
PHP min version
Downloads3K

Community Trust

Rating90/100
Number of ratings4
Active installs10
Developer Profile

Woo NovaPoshta Shipping Method Developer Profile

sergey.kovalchuk

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Woo NovaPoshta Shipping Method

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/woo-novaposhta-shipping-method/assets/js/novaposhta.js
Script Paths
/wp-content/plugins/woo-novaposhta-shipping-method/assets/js/novaposhta.js
Version Parameters
woo-novaposhta-shipping-method/assets/js/novaposhta.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Woo NovaPoshta Shipping Method