
ClicToPay for WooCommerce Security & Risk Analysis
wordpress.org/plugins/clictopay-for-woocommerceThis plugin allows you to accept online payments by SPS Clictopay SMT in WooComerce.
Is ClicToPay for WooCommerce Safe to Use in 2026?
Generally Safe
Score 92/100ClicToPay for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The clictopay-for-woocommerce plugin version 1.0.0 exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, the consistent use of prepared statements for all SQL queries, and the proper escaping of all output signals adherence to secure coding practices. Furthermore, the plugin has no recorded vulnerabilities, including critical or high severity ones, which suggests a history of stable and secure development. The limited attack surface, with only one shortcode and no unprotected entry points, is also a positive indicator.
However, there are areas that warrant attention. The lack of nonce checks is a notable concern, especially as the plugin interacts with external systems via HTTP requests. While no taint analysis revealed unsanitized paths, the absence of nonce checks could potentially allow for Cross-Site Request Forgery (CSRF) attacks if the external HTTP requests are triggered by user actions without proper validation. The plugin also lacks capability checks, meaning that even unauthenticated users might be able to trigger these external requests. The presence of external HTTP requests without explicit security measures like nonces or capability checks introduces a potential risk of unintended or malicious triggering of these communications.
In conclusion, the plugin demonstrates good foundational security by avoiding common pitfalls like raw SQL and unescaped output. The clean vulnerability history is a significant strength. The primary weakness lies in the potential for CSRF vulnerabilities due to the absence of nonce checks and capability checks on critical operations involving external HTTP requests. This could be mitigated by implementing appropriate security measures to protect these entry points.
Key Concerns
- No nonce checks implemented
- No capability checks implemented
ClicToPay for WooCommerce Security Vulnerabilities
ClicToPay for WooCommerce Code Analysis
Output Escaping
ClicToPay for WooCommerce Attack Surface
Shortcodes 1
WordPress Hooks 2
Maintenance & Trust
ClicToPay for WooCommerce Maintenance & Trust
Maintenance Signals
Community Trust
ClicToPay for WooCommerce Alternatives
Network Merchant Payment Gateway for WooCommerce
webmicro-nmi-woo-addon
This plugin is an addon for WooCommerce to implement a payment gateway method for accepting Credit Cards Payments By merchants through Network Merchan …
MerchantOne Payment Gateway WooCommerce Addon
webmicro-merchantone-woo-addon
This plugin is an addon for WooCommerce to implement a payment gateway method for accepting Credit Cards Payments By merchants through Merchant One Pa …
Bluepay Payment Gateway WooCommerce Addon
webmiro-bluepay-woo-addon
This plugin is an addon for WooCommerce to implement a payment gateway method for accepting Credit Cards Payments By merchants through Bluepay Payment …
Payment Gateway for ClicToPay on WooCommerce
wc-clictopay-payment-gateway
ClicToPay Payment Gateway for WooCommerce (designed for stores in Tunisia)
Paystack WooCommerce Payment Gateway
woo-paystack
Paystack for WooCommerce allows your WooCommerce store to accept secure payments from multiple local and global payment channels.
ClicToPay for WooCommerce Developer Profile
2 plugins · 6K total installs
How We Detect ClicToPay for WooCommerce
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/clictopay-for-woocommerce/js/redirect-script.js/wp-content/plugins/clictopay-for-woocommerce/js/redirect-script.jsclictopay-for-woocommerce/js/redirect-script.js?ver=1.0HTML / DOM Fingerprints
failed_payment_urlreturn_url[clictopay_check_payment]