Crediviva Security & Risk Analysis

wordpress.org/plugins/crediviva

Plug in para la integración con gateway de pago Crediviva

0 active installs v1.0.1 PHP 7.4+ WP 5.0+ Updated Unknown
credivivapayment-gatewaypaymentswoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Crediviva Safe to Use in 2026?

Generally Safe

Score 100/100

Crediviva has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The crediviva plugin v1.0.1 exhibits a generally strong security posture based on the static analysis and vulnerability history provided. The absence of any known CVEs, critical or high severity vulnerabilities in its history, and zero taint flows with unsanitized paths are excellent indicators of a well-maintained and secure codebase. Furthermore, the code demonstrates good practices by utilizing prepared statements for all SQL queries and a high percentage of proper output escaping.

However, there are notable areas for improvement. The complete lack of nonce checks and capability checks across all entry points (even though the attack surface is currently zero) presents a significant latent risk. If any new entry points are introduced or if existing functionality is exposed to unauthorized users in the future, the absence of these fundamental security measures could lead to critical vulnerabilities. The presence of external HTTP requests without further analysis of their purpose and how they handle user-supplied data also warrants caution.

In conclusion, while the current state of crediviva is secure due to its limited attack surface and good coding practices in specific areas, the lack of basic authentication and authorization checks is a glaring weakness. This plugin is currently safe due to obscurity rather than robust security design. Future development must address these fundamental security controls to maintain its integrity.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
  • External HTTP requests without further context
Vulnerabilities
None known

Crediviva Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Crediviva Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
2
18 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

90% escaped20 total outputs
Attack Surface

Crediviva Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_noticescrediviva.php:29
actionadmin_noticesincludes\functions\init.php:8
actionbefore_woocommerce_initincludes\functions\init.php:26
actioninitincludes\functions\init.php:38
actionplugins_loadedincludes\functions\init.php:41
filterwoocommerce_payment_gatewaysincludes\functions\init.php:49
actionwoocommerce_blocks_payment_method_type_registrationincludes\functions\init.php:64
actionwoocommerce_blocks_loadedincludes\functions\init.php:73
Maintenance & Trust

Crediviva Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedUnknown
PHP min version7.4
Downloads615

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Crediviva Developer Profile

Crediviva

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Crediviva

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Crediviva