Critical.net – Fraud Detector and Chargeback Prevention Solution Security & Risk Analysis

wordpress.org/plugins/critical-net-fraud-prevention

We offer fraud detection, prevention solutions and data automation strategies. Critical.net protects your WooCommerce store from any suspicious or fra …

10 active installs v1.16.0 PHP 7.0+ WP 5.8.1+ Updated May 4, 2024
blacklist-customerchargeback-preventionfraud-detectorfraud-preventionprevent-fake-orders
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Critical.net – Fraud Detector and Chargeback Prevention Solution Safe to Use in 2026?

Generally Safe

Score 92/100

Critical.net – Fraud Detector and Chargeback Prevention Solution has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The critical-net-fraud-prevention plugin exhibits a mixed security posture. On the positive side, it demonstrates excellent practices in SQL query handling and output escaping, with 100% of SQL queries using prepared statements and all outputs being properly escaped. The absence of dangerous functions, file operations, and known historical vulnerabilities (CVEs) are also strong indicators of good development hygiene. The plugin also correctly implements a nonce check for its single identified entry point.

However, significant concerns arise from the static analysis of its attack surface. The plugin exposes one REST API route without any permission callbacks, making it an unprotected entry point. Furthermore, the taint analysis revealed two flows with unsanitized paths, and while these did not reach critical or high severity in this analysis, the presence of unsanitized paths is inherently risky. The lack of capability checks on any entry points is a notable weakness, as it relies solely on nonce checks for authentication, leaving the REST API route particularly vulnerable.

In conclusion, while the plugin benefits from secure coding practices in its data handling and a clean vulnerability history, the unprotected REST API route and the presence of unsanitized taint flows represent critical security weaknesses that require immediate attention. The absence of capability checks further exacerbates these risks by not enforcing proper user roles and permissions.

Key Concerns

  • REST API route without permission callbacks
  • Flows with unsanitized paths (2)
  • No capability checks on entry points
Vulnerabilities
None known

Critical.net – Fraud Detector and Chargeback Prevention Solution Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Critical.net – Fraud Detector and Chargeback Prevention Solution Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
19 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

100% escaped19 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
handle_post (includes\pages\class-admin.php:142)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Critical.net – Fraud Detector and Chargeback Prevention Solution Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

POST/wp-json/cnfp/v1cancel-orderincludes\base\class-restapi.php:23
WordPress Hooks 11
actionplugins_loadedcritical-net-fraud-prevention.php:64
actionadmin_enqueue_scriptsincludes\base\class-enqueue.php:19
actionuser_registerincludes\base\class-registration.php:21
actionrest_api_initincludes\base\class-restapi.php:20
actionwoocommerce_checkout_order_processedincludes\base\class-transaction.php:22
filterwcs_new_order_createdincludes\base\class-transaction.php:26
filtermanage_edit-shop_order_columnsincludes\base\class-wcorders.php:24
actionmanage_shop_order_posts_custom_columnincludes\base\class-wcorders.php:27
actionadmin_menuincludes\pages\class-admin.php:21
actionadmin_initincludes\pages\class-admin.php:22
actionplugins_loadedincludes\pages\class-admin.php:23
Maintenance & Trust

Critical.net – Fraud Detector and Chargeback Prevention Solution Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 4, 2024
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Critical.net – Fraud Detector and Chargeback Prevention Solution Developer Profile

ctcplugin

1 plugin · 10 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Critical.net – Fraud Detector and Chargeback Prevention Solution

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/critical-net-fraud-prevention/assets/bootstrap.min.css/wp-content/plugins/critical-net-fraud-prevention/assets/critical.css
Version Parameters
critical-net-fraud-prevention/assets/bootstrap.min.css?ver=critical-net-fraud-prevention/assets/critical.css?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- REST API endpoint for cancelling orders. This no longer does anything and is only provided for backwards compatibility. --><!-- This is here for backwards compatibility. --><!-- Call the API. --><!-- get order details data... -->
REST Endpoints
/wp-json/cnfp/v1/cancel-order
FAQ

Frequently Asked Questions about Critical.net – Fraud Detector and Chargeback Prevention Solution