BridgerPay Woocommerce Security & Risk Analysis

wordpress.org/plugins/bridgerpay-woocommerce

The Bridgerpay Woocommerce plugin enables you to easily accept payments through your Woocommerce store.

30 active installs v1.4.2 PHP 7.4+ WP 5.6+ Updated Jan 30, 2026
bridgercashierpaymentsrouting
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is BridgerPay Woocommerce Safe to Use in 2026?

Generally Safe

Score 100/100

BridgerPay Woocommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The bridgerpay-woocommerce plugin v1.4.2 exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding SQL query sanitization, with 100% of queries using prepared statements, and there are no known historical vulnerabilities (CVEs). The plugin also avoids bundled libraries, reducing the risk of relying on outdated or vulnerable third-party code. However, the static analysis reveals several significant areas for concern. The presence of two instances of the `unserialize` function is a critical risk, as it can lead to remote code execution if processing untrusted input. Furthermore, the analysis indicates that 71% of output escaping is properly done, meaning a substantial portion (29%) might be vulnerable to cross-site scripting (XSS) attacks. The taint analysis highlights that all four analyzed flows have unsanitized paths, which, while not classified as critical or high severity in this specific analysis, points to potential vulnerabilities if the input sources were to be considered untrusted or if the `unserialize` functions were to process such inputs. The complete lack of nonce checks and capability checks is a major weakness, especially if any of the entry points (though currently zero) were to be exposed or if future versions introduce them without proper authentication and authorization. These omissions significantly increase the risk of unauthorized actions and privilege escalation.

Key Concerns

  • Dangerous function `unserialize` usage
  • Unsanitized paths in taint flows
  • Missing nonce checks
  • Missing capability checks
  • Insufficient output escaping (29% unescaped)
Vulnerabilities
None known

BridgerPay Woocommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

BridgerPay Woocommerce Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
10
24 escaped
Nonce Checks
0
Capability Checks
0
File Operations
5
External Requests
6
Bundled Libraries
0

Dangerous Functions Found

unserializeelseif(isset($string) && $string && @unserialize($string)){includes\functions.php:106
unserializereturn unserialize($string);includes\functions.php:107

Output Escaping

71% escaped34 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
redirect_to_thank_you_page (includes\class-wc-bridgerpay-gateway.php:692)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

BridgerPay Woocommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 20
actionplugins_loadedbridgerpay-woocommerce.php:25
filterwoocommerce_payment_gatewaysbridgerpay-woocommerce.php:26
actionbefore_woocommerce_initbridgerpay-woocommerce.php:31
actionwoocommerce_blocks_loadedbridgerpay-woocommerce.php:39
actionwoocommerce_blocks_payment_method_type_registrationbridgerpay-woocommerce.php:50
actionshutdownincludes\blocks\bridgerpay-wallet-blocks-support.php:67
actionwoocommerce_api_bridgerpay_gatewayincludes\class-wc-bridgerpay-gateway.php:93
actionwoocommerce_after_checkout_formincludes\class-wc-bridgerpay-gateway.php:94
actionwoocommerce_pay_order_after_submitincludes\class-wc-bridgerpay-gateway.php:95
actionadmin_enqueue_scriptsincludes\class-wc-bridgerpay-gateway.php:97
actionwp_footerincludes\class-wc-bridgerpay-gateway.php:103
actionwoocommerce_thankyouincludes\class-wc-bridgerpay-gateway.php:106
actionwoocommerce_receipt_bridgerpay_gatewayincludes\class-wc-bridgerpay-gateway.php:107
actionwp_footerincludes\class-wc-bridgerpay-gateway.php:561
actionwoocommerce_api_bridgerpay_wallet_gatewayincludes\class-wc-bridgerpay-wallet-gateway.php:84
actionwoocommerce_after_checkout_formincludes\class-wc-bridgerpay-wallet-gateway.php:85
actionwoocommerce_pay_order_after_submitincludes\class-wc-bridgerpay-wallet-gateway.php:86
actionwoocommerce_thankyouincludes\class-wc-bridgerpay-wallet-gateway.php:97
actionwoocommerce_receipt_bridgerpay_wallet_gatewayincludes\class-wc-bridgerpay-wallet-gateway.php:98
actionwp_footerincludes\class-wc-bridgerpay-wallet-gateway.php:920
Maintenance & Trust

BridgerPay Woocommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 30, 2026
PHP min version7.4
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs30
Developer Profile

BridgerPay Woocommerce Developer Profile

bridgerpay

1 plugin · 30 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect BridgerPay Woocommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/bridgerpay-woocommerce/assets/css/style.css/wp-content/plugins/bridgerpay-woocommerce/assets/js/wallet_utility.js/wp-content/plugins/bridgerpay-woocommerce/assets/js/blocks/wallet-gateway-blocks.js
Script Paths
/wp-content/plugins/bridgerpay-woocommerce/assets/js/wallet_utility.js/wp-content/plugins/bridgerpay-woocommerce/assets/js/blocks/wallet-gateway-blocks.js
Version Parameters
bridgerpay-woocommerce/assets/css/style.css?ver=bridgerpay-woocommerce/assets/js/wallet_utility.js?ver=bridgerpay-woocommerce/assets/js/blocks/wallet-gateway-blocks.js?ver=

HTML / DOM Fingerprints

CSS Classes
bridgerpay-wallet-gateway-blocks
Data Attributes
bridgerpay_cashier
JS Globals
bridgerpay_wallet_data
FAQ

Frequently Asked Questions about BridgerPay Woocommerce