CentroBill Payment Gateway for WooCommerce Security & Risk Analysis

wordpress.org/plugins/centrobill-payment-gateway

Allows you to use CentroBill payment gateway with the WooCommerce plugin.

10 active installs v2.2.11 PHP 5.6+ WP 5.1+ Updated Sep 23, 2025
centrobillcredit-cardonline-paymentpayment-gatewaywoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CentroBill Payment Gateway for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

CentroBill Payment Gateway for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6mo ago
Risk Assessment

The centrobill-payment-gateway plugin v2.2.11 exhibits a mixed security posture. On the positive side, the absence of known vulnerabilities in its history and the complete use of prepared statements for SQL queries are strong indicators of good development practices. Furthermore, the static analysis reveals a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are directly exposed and unprotected. This suggests that the plugin is not readily presenting entry points for common web attacks.

However, significant concerns arise from the static code analysis. The presence of the `unserialize` function, without any apparent nonce or capability checks around its usage, is a critical risk. Unsanitized serialized data can lead to remote code execution vulnerabilities if an attacker can control the data being unserialized. Additionally, a low percentage (23%) of properly escaped output is a notable weakness, potentially opening the door to cross-site scripting (XSS) attacks if user-supplied data is rendered directly in the browser without adequate sanitization. The lack of any capability checks or nonce checks further exacerbates these risks by leaving these potentially vulnerable functions exposed.

In conclusion, while the plugin's history is clean and SQL handling is robust, the identified `unserialize` function and the prevalent unescaped output present substantial security risks that need immediate attention. The minimal attack surface is a strength, but it does not negate the severity of the identified code-level vulnerabilities.

Key Concerns

  • Use of unserialize without checks
  • Low percentage of properly escaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

CentroBill Payment Gateway for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

CentroBill Payment Gateway for WooCommerce Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
10
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$ppgetdataParams = unserialize(base64_decode($ppgetdata));includes\class-wc-centrobill-webhook-handler.php:104

Output Escaping

23% escaped13 total outputs
Attack Surface

CentroBill Payment Gateway for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actionwoocommerce_after_checkout_validationincludes\class-wc-centrobill-gateway.php:37
actionwoocommerce_api_wc_gateway_centrobillincludes\class-wc-centrobill-gateway.php:38
filterwp_enqueue_scriptsincludes\class-wc-centrobill-gateway.php:39
filterwc_centrobill_settings_nav_tabsincludes\class-wc-centrobill-gateway.php:40
filterwoocommerce_create_orderincludes\class-wc-centrobill-gateway.php:41
filterwoocommerce_available_payment_gatewaysincludes\class-wc-centrobill-gateway.php:75
actionadmin_noticesincludes\gateways\class-wc-centrobill-gateway-cc.php:17
actionplugins_loadedwc-centrobill.php:56
filterwoocommerce_payment_gatewayswc-centrobill.php:102
filterwoocommerce_available_payment_gatewayswc-centrobill.php:149
actionwoocommerce_checkout_update_order_reviewwc-centrobill.php:214
Maintenance & Trust

CentroBill Payment Gateway for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedSep 23, 2025
PHP min version5.6
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

CentroBill Payment Gateway for WooCommerce Developer Profile

centrobill

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CentroBill Payment Gateway for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/centrobill-payment-gateway/assets/js/frontend.js/wp-content/plugins/centrobill-payment-gateway/assets/css/frontend.css/wp-content/plugins/centrobill-payment-gateway/assets/js/admin.js/wp-content/plugins/centrobill-payment-gateway/assets/css/admin.css
Script Paths
/wp-content/plugins/centrobill-payment-gateway/assets/js/frontend.js/wp-content/plugins/centrobill-payment-gateway/assets/js/admin.js
Version Parameters
centrobill-payment-gateway/assets/js/frontend.js?ver=centrobill-payment-gateway/assets/css/frontend.css?ver=centrobill-payment-gateway/assets/js/admin.js?ver=centrobill-payment-gateway/assets/css/admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
wc_centrobill_payment_methods
Data Attributes
data-centrobill-payment-methods
JS Globals
WC_Centrobill_Frontend
REST Endpoints
/wp-json/centrobill/v1/payment-methods
FAQ

Frequently Asked Questions about CentroBill Payment Gateway for WooCommerce