Credo WooCommerce Payment Gateway Security & Risk Analysis

wordpress.org/plugins/credo-payment-forms

Credo enables easier, intelligent, and rewarding payments for businesses and consumers alike, by combining the best of digital payments and digital in …

10 active installs v2.0.2 PHP 7.4+ WP 5.8+ Updated Jun 5, 2024
credopayment-gateway-mastercardvervevisawoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Credo WooCommerce Payment Gateway Safe to Use in 2026?

Generally Safe

Score 92/100

Credo WooCommerce Payment Gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The credo-payment-forms plugin, version 2.0.2, exhibits a mixed security posture. On the positive side, it demonstrates good practices by not exposing a significant attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events found in the static analysis. Furthermore, all SQL queries are secured using prepared statements, and there is no recorded vulnerability history, suggesting a generally stable and secure development over time.

However, several areas raise concerns. The plugin has a relatively low percentage of properly escaped output (59%), indicating a potential for cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled rigorously across all output points. The presence of two flows with unsanitized paths in the taint analysis, while not classified as critical or high severity, warrants attention as these could be entry points for path traversal or other file-related attacks, especially given that a file operation is present. The complete lack of nonce and capability checks, particularly in conjunction with file operations or external HTTP requests, represents a significant oversight in securing sensitive actions.

In conclusion, while the plugin avoids common pitfalls like unpatched CVEs and raw SQL queries, the significant portion of unescaped output, unsanitized paths, and the absence of fundamental security checks like nonces and capability checks create notable vulnerabilities. The strengths lie in its limited attack surface and proper SQL handling, but these are overshadowed by potential XSS and file-related risks, and the lack of authorization controls.

Key Concerns

  • Unescaped output is a significant concern.
  • Taint flows with unsanitized paths are a risk.
  • Absence of nonce checks.
  • Absence of capability checks.
  • File operation without authorization checks.
  • External HTTP requests without authorization.
Vulnerabilities
None known

Credo WooCommerce Payment Gateway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Credo WooCommerce Payment Gateway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
10 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
2
Bundled Libraries
0

Output Escaping

59% escaped17 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
verify_credo_transaction (includes\class-wc-gateway-credo.php:909)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Credo WooCommerce Payment Gateway Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 15
actionwoocommerce_rest_checkout_process_payment_with_contextincludes\class-wc-gateway-credo-blocks-support.php:23
actionwc_gateway_credo_process_payment_errorincludes\class-wc-gateway-credo-blocks-support.php:94
actionadmin_enqueue_scriptsincludes\class-wc-gateway-credo.php:230
actionwp_enqueue_scriptsincludes\class-wc-gateway-credo.php:231
actionadmin_noticesincludes\class-wc-gateway-credo.php:233
actionwoocommerce_api_wc_gateway_credoincludes\class-wc-gateway-credo.php:245
actionwoocommerce_api_tbz_wc_credo_webhookincludes\class-wc-gateway-credo.php:248
actionadmin_noticeswoo-credo.php:39
actionadmin_initwoo-credo.php:43
filterwoocommerce_payment_gatewayswoo-credo.php:47
actionplugins_loadedwoo-credo.php:52
actiondisable-credo-test-modewoo-credo.php:131
actionbefore_woocommerce_initwoo-credo.php:135
actionwoocommerce_blocks_payment_method_type_registrationwoo-credo.php:152
actionwoocommerce_blocks_loadedwoo-credo.php:161
Maintenance & Trust

Credo WooCommerce Payment Gateway Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedJun 5, 2024
PHP min version7.4
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Credo WooCommerce Payment Gateway Developer Profile

credocentral

1 plugin · 10 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Credo WooCommerce Payment Gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/credo-payment-forms/includes/js/credo-gateway-main.js/wp-content/plugins/credo-payment-forms/includes/css/credo-gateway.css
Version Parameters
credo-payment-forms/includes/js/credo-gateway-main.js?ver=credo-payment-forms/includes/css/credo-gateway.css?ver=

HTML / DOM Fingerprints

CSS Classes
credo-payment-gateway-form
Data Attributes
data-credo-public-keydata-credo-test-mode
JS Globals
credo_gateway_params
FAQ

Frequently Asked Questions about Credo WooCommerce Payment Gateway