Cobrança U4crypto Security & Risk Analysis

wordpress.org/plugins/cobranca-u4crypto

Cobrança U4crypto! Olá! Esse Plugin foi desenvolvido pela www.diletec.com.br para adicionar o metodo de pagamento da U4crypto ao Wordpress Woocommer …

0 active installs v1.5.0 PHP 7.0+ WP 4.4+ Updated Unknown
boletoe-commercepixu4cryptowoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Cobrança U4crypto Safe to Use in 2026?

Generally Safe

Score 100/100

Cobrança U4crypto has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "cobranca-u4crypto" v1.5.0 plugin exhibits a mixed security posture. While the static analysis reports a remarkably small attack surface with no exposed AJAX handlers, REST API routes, or shortcodes, and no recorded vulnerability history, significant concerns arise from the code signals. The presence of the `unserialize` function four times without any apparent nonce or capability checks is a major red flag, as it can lead to remote code execution if the serialized data is controlled by an attacker. Furthermore, all SQL queries are executed without prepared statements, exposing the plugin to SQL injection vulnerabilities. The lack of external HTTP requests and the absence of taint analysis findings are positive aspects, suggesting that the plugin doesn't directly interact with external resources in a vulnerable way or that the static analysis tools could not identify such flows. However, the fundamental insecure coding practices around `unserialize` and raw SQL queries present substantial risks that overshadow the limited attack surface.

Key Concerns

  • Dangerous function 'unserialize' used 4 times without checks
  • All SQL queries use raw execution, no prepared statements
  • 0 Nonce checks found
  • 0 Capability checks found
Vulnerabilities
None known

Cobrança U4crypto Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Cobrança U4crypto Code Analysis

Dangerous Functions
4
Raw SQL Queries
5
0 prepared
Unescaped Output
22
61 escaped
Nonce Checks
0
Capability Checks
0
File Operations
24
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserializeunserialize( $results[0]->option_value )gateways\billet.php:479
unserializeunserialize( $results[0]->option_value )gateways\card.php:306
unserializeunserialize( $results[0]->option_value )gateways\pix.php:269
unserializeunserialize( $results[0]->option_value )gateways\qrcode.php:235

SQL Query Safety

0% prepared5 total queries

Output Escaping

73% escaped83 total outputs
Attack Surface

Cobrança U4crypto Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 40
filterdokan_query_var_filteradd-ons\dokan\index.php:3
filterdokan_get_dashboard_navadd-ons\dokan\index.php:9
actiondokan_load_custom_templateadd-ons\dokan\index.php:20
actionplugins_loadedgateways\billet.php:8
actionadmin_noticesgateways\billet.php:11
actionwoocommerce_email_before_order_tablegateways\billet.php:66
actionwoocommerce_api_wc_u4cryptogateways\billet.php:76
filterwoocommerce_payment_gatewaysgateways\billet.php:702
actionplugins_loadedgateways\card.php:8
actionadmin_noticesgateways\card.php:11
actionwoocommerce_email_before_order_tablegateways\card.php:47
filterwoocommerce_payment_gatewaysgateways\card.php:318
actionwoocommerce_checkout_processgateways\card.php:324
actionplugins_loadedgateways\pix.php:8
actionadmin_noticesgateways\pix.php:12
actionwoocommerce_email_before_order_tablegateways\pix.php:64
filterwoocommerce_payment_gatewaysgateways\pix.php:502
actionplugins_loadedgateways\qrcode.php:8
actionadmin_noticesgateways\qrcode.php:11
actionwoocommerce_email_before_order_tablegateways\qrcode.php:48
filterwoocommerce_payment_gatewaysgateways\qrcode.php:249
actionwoocommerce_admin_order_data_after_billing_addressincludes\adminDisplay.php:6
filtercron_schedulesincludes\cancelErpBillet.php:14
actionu4crypto_cron_hookincludes\cancelErpBillet.php:20
actionwoocommerce_order_details_after_order_tableincludes\customerDisplay.php:8
actionwoocommerce_order_details_after_order_tableincludes\customerDisplay.php:216
actionwoocommerce_order_details_after_order_tableincludes\customerDisplay.php:455
actionwoocommerce_checkout_processincludes\gatewayErpBillet.php:10
actionwoocommerce_checkout_update_order_metaincludes\gatewayErpBillet.php:76
actionwoocommerce_checkout_update_order_metaincludes\gatewayErpBillet.php:221
actionwoocommerce_checkout_update_order_metaincludes\gatewayErpBillet.php:426
actionwoocommerce_checkout_update_order_metaincludes\gatewayErpBillet.php:635
actionadmin_menuincludes\menu.php:17
filterwoocommerce_account_menu_itemsincludes\mycards.php:6
actioninitincludes\mycards.php:23
actionwoocommerce_account_mycards_endpointincludes\mycards.php:32
actionadmin_noticesincludes\registerError.php:33
actionplugins_loadedindex.php:51
filterplugin_action_linksindex.php:111
actionwp_enqueue_scriptsindex.php:119

Scheduled Events 1

u4crypto_cron_hook
Maintenance & Trust

Cobrança U4crypto Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedUnknown
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Cobrança U4crypto Developer Profile

Diletec

2 plugins · 30 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cobrança U4crypto

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cobranca-u4crypto/assets/css/u4crypto-btn-billet.css
Version Parameters
cobranca-u4crypto/assets/css/u4crypto-btn-billet.css?ver=

HTML / DOM Fingerprints

CSS Classes
u4crypto-acf-notice
Data Attributes
data-post_type="attachment-gallery"data-columns="3"
FAQ

Frequently Asked Questions about Cobrança U4crypto