ClicToPay for WooCommerce Security & Risk Analysis

wordpress.org/plugins/clictopay-for-woocommerce

This plugin allows you to accept online payments by SPS Clictopay SMT in WooComerce.

100 active installs v1.0.0 PHP 4.0+ WP 5.0+ Updated Nov 20, 2024
clictopaycredit-card-paymentpayment-gatewaywoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is ClicToPay for WooCommerce Safe to Use in 2026?

Generally Safe

Score 92/100

ClicToPay for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The clictopay-for-woocommerce plugin version 1.0.0 exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, the consistent use of prepared statements for all SQL queries, and the proper escaping of all output signals adherence to secure coding practices. Furthermore, the plugin has no recorded vulnerabilities, including critical or high severity ones, which suggests a history of stable and secure development. The limited attack surface, with only one shortcode and no unprotected entry points, is also a positive indicator.

However, there are areas that warrant attention. The lack of nonce checks is a notable concern, especially as the plugin interacts with external systems via HTTP requests. While no taint analysis revealed unsanitized paths, the absence of nonce checks could potentially allow for Cross-Site Request Forgery (CSRF) attacks if the external HTTP requests are triggered by user actions without proper validation. The plugin also lacks capability checks, meaning that even unauthenticated users might be able to trigger these external requests. The presence of external HTTP requests without explicit security measures like nonces or capability checks introduces a potential risk of unintended or malicious triggering of these communications.

In conclusion, the plugin demonstrates good foundational security by avoiding common pitfalls like raw SQL and unescaped output. The clean vulnerability history is a significant strength. The primary weakness lies in the potential for CSRF vulnerabilities due to the absence of nonce checks and capability checks on critical operations involving external HTTP requests. This could be mitigated by implementing appropriate security measures to protect these entry points.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

ClicToPay for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ClicToPay for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

ClicToPay for WooCommerce Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[clictopay_check_payment] clictopay-for-woocommerce.php:182
WordPress Hooks 2
filterwoocommerce_payment_gatewaysclictopay-for-woocommerce.php:39
actionplugins_loadedclictopay-for-woocommerce.php:45
Maintenance & Trust

ClicToPay for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 20, 2024
PHP min version4.0
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

ClicToPay for WooCommerce Developer Profile

DALINOVATE

2 plugins · 6K total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ClicToPay for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/clictopay-for-woocommerce/js/redirect-script.js
Script Paths
/wp-content/plugins/clictopay-for-woocommerce/js/redirect-script.js
Version Parameters
clictopay-for-woocommerce/js/redirect-script.js?ver=1.0

HTML / DOM Fingerprints

JS Globals
failed_payment_urlreturn_url
Shortcode Output
[clictopay_check_payment]
FAQ

Frequently Asked Questions about ClicToPay for WooCommerce