Cardinity Payment Gateway for WooCommerce Security & Risk Analysis

wordpress.org/plugins/cardinity-free-payment-gateway-for-woocommerce

Add Cardinity checkout form to your WooCommerce site and start accepting payments.

300 active installs v3.4.0 PHP 7.4.0+ WP 4.0.2+ Updated Jan 14, 2026
cardinitycardinity-checkoutpayment-gatewaypaymentswoocommerce
100
A · Safe
CVEs total1
Unpatched0
Last CVEOct 4, 2021
Download
Safety Verdict

Is Cardinity Payment Gateway for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

Cardinity Payment Gateway for WooCommerce has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Oct 4, 2021Updated 2mo ago
Risk Assessment

The plugin "cardinity-free-payment-gateway-for-woocommerce" v3.4.0 exhibits a generally positive security posture based on the static analysis. The absence of direct entry points like AJAX handlers, REST API routes, and shortcodes, coupled with the complete absence of unprotected entry points, significantly reduces its attack surface. Furthermore, the code demonstrates good practices by exclusively using prepared statements for SQL queries and achieving a high percentage of properly escaped output. The reliance on bundled libraries like Guzzle is noted but not immediately flagged as a concern without further information on its version and security state.

However, there are areas that warrant attention. The presence of four unsanitized paths in the taint analysis, even without reaching critical or high severity, indicates potential weaknesses in input handling that could be exploited if an attacker can control the data flowing through these paths. The plugin also lacks explicit nonce checks, which are a crucial defense against Cross-Site Request Forgery (CSRF) attacks, especially if any of the limited capability checks could be bypassed or are insufficient. The vulnerability history, while currently showing no unpatched CVEs, does reveal a past medium severity Cross-Site Scripting (XSS) vulnerability, suggesting that thorough input sanitization and output escaping remain important.

In conclusion, the plugin has a strong foundation with its minimal attack surface and sound SQL practices. The main concerns lie in the potential for unsanitized input paths and the absence of nonce checks. While the past XSS vulnerability is currently patched, it serves as a reminder to remain vigilant regarding input validation. The plugin is in a relatively good state, but addressing the identified taint flow issues and implementing nonce checks would further strengthen its security.

Key Concerns

  • Taint flows with unsanitized paths
  • Lack of nonce checks
  • Bundled library (Guzzle)
Vulnerabilities
1

Cardinity Payment Gateway for WooCommerce Security Vulnerabilities

CVEs by Year

1 CVE in 2021
2021
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

WF-48b4214f-b722-405e-9bb7-a1faa68f0429-cardinity-free-payment-gateway-for-woocommercemedium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cardinity Payment Gateway for WooCommerce <= 3.0.6 - Reflected Cross-Site Scripting

Oct 4, 2021 Patched in 3.0.7 (841d)
Code Analysis
Analyzed Mar 16, 2026

Cardinity Payment Gateway for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
77 escaped
Nonce Checks
0
Capability Checks
2
File Operations
10
External Requests
0
Bundled Libraries
1

Bundled Libraries

Guzzle

Output Escaping

97% escaped79 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

6 flows4 with unsanitized paths
cardinity_wc_download_log (class-wc-gateway-cardinity.php:97)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Cardinity Payment Gateway for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
filterwoocommerce_payment_gatewaysclass-wc-gateway-cardinity.php:156
actionwoocommerce_scheduled_subscription_payment_cardinityclass-wc-gateway-cardinity.php:167
actionadmin_initclass-wc-gateway-cardinity.php:177
actionplugins_loadedclass-wc-gateway-cardinity.php:182
actionbefore_woocommerce_initclass-wc-gateway-cardinity.php:184
actionwoocommerce_credit_card_form_startclass-wc-gateway-cardinity.php:191
actionbefore_woocommerce_initclass-wc-gateway-cardinity.php:248
actionwoocommerce_blocks_loadedclass-wc-gateway-cardinity.php:251
actionwoocommerce_blocks_payment_method_type_registrationclass-wc-gateway-cardinity.php:267
actionwoocommerce_receipt_cardinityincludes\WC_Cardinity_Gateway.php:102
actionwoocommerce_api_wc_gateway_cardinityincludes\WC_Cardinity_Gateway.php:103
actionwoocommerce_api_wc_gateway_cardinity_notifyincludes\WC_Cardinity_Gateway.php:104
Maintenance & Trust

Cardinity Payment Gateway for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.0
Last updatedJan 14, 2026
PHP min version7.4.0
Downloads16K

Community Trust

Rating76/100
Number of ratings10
Active installs300
Developer Profile

Cardinity Payment Gateway for WooCommerce Developer Profile

Cardinity.com

2 plugins · 310 total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
841 days
View full developer profile
Detection Fingerprints

How We Detect Cardinity Payment Gateway for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cardinity-free-payment-gateway-for-woocommerce/assets/css/cardinity-gateway.css/wp-content/plugins/cardinity-free-payment-gateway-for-woocommerce/assets/js/cardinity-gateway.js/wp-content/plugins/cardinity-free-payment-gateway-for-woocommerce/assets/js/cardinity-gateway-admin.js
Script Paths
/wp-content/plugins/cardinity-free-payment-gateway-for-woocommerce/assets/js/cardinity-gateway.js/wp-content/plugins/cardinity-free-payment-gateway-for-woocommerce/assets/js/cardinity-gateway-admin.js
Version Parameters
cardinity-free-payment-gateway-for-woocommerce/assets/css/cardinity-gateway.css?ver=cardinity-free-payment-gateway-for-woocommerce/assets/js/cardinity-gateway.js?ver=cardinity-free-payment-gateway-for-woocommerce/assets/js/cardinity-gateway-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
cardinity-card-holder
Data Attributes
name="cardinity-card-holder"class="input-text wc-credit-card-form-card-holder"
JS Globals
WC_Cardinity_Gateway
FAQ

Frequently Asked Questions about Cardinity Payment Gateway for WooCommerce