WPC Role-Based Shipping Methods for WooCommerce Security & Risk Analysis

wordpress.org/plugins/wpc-role-based-shipping-methods

WPC Role-Based Shipping Methods allow the limitation of available shipping methods for each user role individually.

100 active installs v1.0.4 PHP + WP 4.0+ Updated Dec 11, 2025
role-basedshippingwoocommercewpc
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPC Role-Based Shipping Methods for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

WPC Role-Based Shipping Methods for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The "wpc-role-based-shipping-methods" v1.0.4 plugin exhibits a generally good security posture, with no known vulnerabilities or critical taint flows detected. The code analysis shows strong adherence to security best practices, including 100% of SQL queries using prepared statements, a high percentage of properly escaped output, and the presence of nonce and capability checks on its entry points. The absence of file operations and dangerous functions like `unserialize` further bolsters its security.

However, the presence of the `unserialize` function, even if not directly exploitable in this version based on the analysis, represents a potential concern for future versions or if used carelessly. While the attack surface of 5 AJAX handlers is small and all appear to be protected, the `unserialize` function itself is a known vector for deserialization vulnerabilities if user-controlled data is ever passed to it without proper validation. The plugin's history of zero recorded vulnerabilities is a positive indicator, suggesting diligent development and testing.

In conclusion, the plugin is currently well-secured. The primary area for vigilance would be the `unserialize` function. If its usage is essential, it should be strictly monitored to ensure no user-controlled input can influence its execution. Otherwise, the plugin demonstrates a commitment to secure coding.

Key Concerns

  • Dangerous function: unserialize detected
Vulnerabilities
None known

WPC Role-Based Shipping Methods for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WPC Role-Based Shipping Methods for WooCommerce Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
5
96 escaped
Nonce Checks
7
Capability Checks
2
File Operations
0
External Requests
3
Bundled Libraries
0

Dangerous Functions Found

unserialize$plugins = unserialize( $response['body'] );includes\dashboard\wpc-dashboard.php:111
unserialize$plugins = unserialize( $response['body'] );includes\dashboard\wpc-dashboard.php:189
unserialize$plugins = unserialize( $response['body'] );includes\kit\wpc-kit.php:98

Output Escaping

95% escaped101 total outputs
Data Flows
All sanitized

Data Flow Analysis

3 flows
ajax_export (includes\dashboard\wpc-dashboard.php:225)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WPC Role-Based Shipping Methods for WooCommerce Attack Surface

Entry Points5
Unprotected0

AJAX Handlers 5

authwp_ajax_wpc_get_pluginsincludes\dashboard\wpc-dashboard.php:19
authwp_ajax_wpc_get_suggestionincludes\dashboard\wpc-dashboard.php:20
authwp_ajax_wpc_exportincludes\dashboard\wpc-dashboard.php:21
authwp_ajax_wpc_importincludes\dashboard\wpc-dashboard.php:22
authwp_ajax_wpc_get_essential_kitincludes\kit\wpc-kit.php:22
WordPress Hooks 14
actionadmin_enqueue_scriptsincludes\dashboard\wpc-dashboard.php:17
actionadmin_menuincludes\dashboard\wpc-dashboard.php:18
actionbefore_woocommerce_initincludes\hpos.php:7
actionadmin_enqueue_scriptsincludes\kit\wpc-kit.php:20
actionadmin_menuincludes\kit\wpc-kit.php:21
actionplugins_loadedwpc-role-based-shipping-methods.php:37
actionadmin_noticeswpc-role-based-shipping-methods.php:41
actioninitwpc-role-based-shipping-methods.php:63
actionadmin_enqueue_scriptswpc-role-based-shipping-methods.php:66
actionadmin_initwpc-role-based-shipping-methods.php:67
actionadmin_menuwpc-role-based-shipping-methods.php:68
filterplugin_action_linkswpc-role-based-shipping-methods.php:71
filterplugin_row_metawpc-role-based-shipping-methods.php:72
filterwoocommerce_package_rateswpc-role-based-shipping-methods.php:75
Maintenance & Trust

WPC Role-Based Shipping Methods for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 11, 2025
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

WPC Role-Based Shipping Methods for WooCommerce Developer Profile

WPClever

71 plugins · 441K total installs

87
trust score
Avg Security Score
99/100
Avg Patch Time
68 days
View full developer profile
Detection Fingerprints

How We Detect WPC Role-Based Shipping Methods for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpc-role-based-shipping-methods/assets/css/backend.css/wp-content/plugins/wpc-role-based-shipping-methods/assets/js/backend.js
Version Parameters
wpc-role-based-shipping-methods/assets/css/backend.css?ver=wpc-role-based-shipping-methods/assets/js/backend.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpclever_settings_pagewpclever_settings_page_headerwpclever_settings_page_header_logowpclever_settings_page_header_textwpclever_settings_page_titlewpclever_settings_page_nav
Data Attributes
data-tab
FAQ

Frequently Asked Questions about WPC Role-Based Shipping Methods for WooCommerce