UPS Shipping Security & Risk Analysis

wordpress.org/plugins/woo-ups-shipping

UPS Shipping method for WooCommerce site. Easy installation and very light for WooCommerce sites.

40 active installs v2.1.1 PHP + WP 4.4+ Updated Apr 5, 2021
shipping-methodupsups-shippingups-shipping-rate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is UPS Shipping Safe to Use in 2026?

Generally Safe

Score 85/100

UPS Shipping has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "woo-ups-shipping" v2.1.1 plugin exhibits a generally strong security posture with no recorded vulnerabilities or known CVEs. The absence of SQL injection vulnerabilities due to the consistent use of prepared statements is a significant positive. Furthermore, the limited attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events, reduces the potential entry points for attackers. However, a critical concern arises from the complete lack of output escaping, meaning all four identified output points are vulnerable to Cross-Site Scripting (XSS) attacks. Additionally, the absence of nonce checks and capability checks on any potential entry points, even though none are explicitly identified, is a weakness that could be exploited if new entry points are introduced or if existing ones are discovered. The single external HTTP request also warrants investigation to ensure it does not introduce vulnerabilities.

Key Concerns

  • All output is unescaped (XSS risk)
  • No nonce checks
  • No capability checks
  • External HTTP request exists
Vulnerabilities
None known

UPS Shipping Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

UPS Shipping Release Timeline

v2.1.0
v2.0.5
v2.0.4
v2.0.3
v2.0.2
v2.0.1
v2.0.0
v1.0.0
Code Analysis
Analyzed Apr 16, 2026

UPS Shipping Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

UPS Shipping Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_noticeswoo-ups-shipping.php:104
actionwoocommerce_shipping_initwoo-ups-shipping.php:459
filterwoocommerce_shipping_methodswoo-ups-shipping.php:473
Maintenance & Trust

UPS Shipping Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.0
Last updatedApr 5, 2021
PHP min version
Downloads4K

Community Trust

Rating90/100
Number of ratings2
Active installs40
Developer Profile

UPS Shipping Developer Profile

mingocommerce

3 plugins · 450 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect UPS Shipping

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/woo-ups-shipping/assets/css/woo-ups-shipping-admin.css/wp-content/plugins/woo-ups-shipping/assets/js/woo-ups-shipping-admin.js
Script Paths
/wp-content/plugins/woo-ups-shipping/assets/js/woo-ups-shipping-admin.js
Version Parameters
woo-ups-shipping/assets/css/woo-ups-shipping-admin.css?ver=woo-ups-shipping/assets/js/woo-ups-shipping-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
mingocommerce_ups_shipping_fieldups_shipping_form_field
HTML Comments
Legacy function for 3.1.1
Data Attributes
data-ups-login-iddata-ups-passworddata-ups-access-keydata-ups-shipper-numberdata-ups-origin-postcodedata-ups-negotiated-rates+8 more
JS Globals
window.mingo_ups_shipping_admin
FAQ

Frequently Asked Questions about UPS Shipping