Woo Tracking for The Courier Guy Security & Risk Analysis

wordpress.org/plugins/woo-tracking-the-courier-guy

This is a simple plugin to display tracking information for The Courier Guy on your WooCommerce orders page.

70 active installs v1.0.6 PHP + WP 3.0.1+ Updated Dec 5, 2017
courierthe-courier-guytrackingwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Woo Tracking for The Courier Guy Safe to Use in 2026?

Generally Safe

Score 85/100

Woo Tracking for The Courier Guy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "woo-tracking-the-courier-guy" plugin version 1.0.6 exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points is a significant strength. Furthermore, the code signals indicate no dangerous functions or SQL queries executed without prepared statements, suggesting good development practices in these areas. The presence of nonce and capability checks, along with a single external HTTP request, are not inherently concerning without further context on their implementation.

However, a key area for concern lies in the output escaping, where only 15% of the 13 identified outputs are properly escaped. This indicates a potential for cross-site scripting (XSS) vulnerabilities, especially if user-supplied data is being rendered without adequate sanitization. The lack of any recorded vulnerabilities or CVEs in its history is a positive indicator, suggesting a history of secure development, but this does not negate the identified output escaping issue.

In conclusion, while the plugin demonstrates robust security in its entry point management and database interactions, the insufficient output escaping presents a notable risk. The absence of historical vulnerabilities is encouraging, but the identified code-level weakness requires attention to prevent potential XSS attacks.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Woo Tracking for The Courier Guy Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Woo Tracking for The Courier Guy Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
2 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

15% escaped13 total outputs
Attack Surface

Woo Tracking for The Courier Guy Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadd_meta_boxeswoo-tracking-the-courier-guy.php:26
actionsave_postwoo-tracking-the-courier-guy.php:66
actionwoocommerce_order_details_after_order_tablewoo-tracking-the-courier-guy.php:200
actionwoocommerce_email_before_order_tablewoo-tracking-the-courier-guy.php:213
filterwoocommerce_admin_order_actionswoo-tracking-the-courier-guy.php:228
actionadmin_headwoo-tracking-the-courier-guy.php:245
Maintenance & Trust

Woo Tracking for The Courier Guy Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedDec 5, 2017
PHP min version
Downloads4K

Community Trust

Rating40/100
Number of ratings4
Active installs70
Developer Profile

Woo Tracking for The Courier Guy Developer Profile

francdore

1 plugin · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Woo Tracking for The Courier Guy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
woo-tracking-the-courier-guy
Shortcode Output
<div class="woo-tracking-the-courier-guy">
FAQ

Frequently Asked Questions about Woo Tracking for The Courier Guy