CryptoCloud – Crypto Payment Gateway Security & Risk Analysis

wordpress.org/plugins/cryptocloud-crypto-payment-gateway

CryptoCloud - cryptocurrency payment system for business. We offer to you a possibility to accept payments worldwide in 40 cryptocurrencies.

400 active installs v2.3.2 PHP 5.6+ WP 4.5+ Updated Feb 16, 2026
bitcoin-payment-gatewaycrypto-payment-gatewaycryptocurrencycryptocurrency-paymentspayment-gateway
78
B · Generally Safe
CVEs total1
Unpatched1
Last CVEMay 22, 2025
Safety Verdict

Is CryptoCloud – Crypto Payment Gateway Safe to Use in 2026?

Mostly Safe

Score 78/100

CryptoCloud – Crypto Payment Gateway is generally safe to use. 1 past CVE were resolved. Keep it updated.

1 known CVE 1 unpatched Last CVE: May 22, 2025Updated 1mo ago
Risk Assessment

The static analysis of the 'cryptocloud-crypto-payment-gateway' plugin v2.3.2 reveals a seemingly strong security posture in some areas. The absence of any identified dangerous functions, SQL queries using prepared statements, properly escaped output, and a lack of taint flows with unsanitized paths are positive indicators. Furthermore, the plugin has no identified entry points such as AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without authentication or permission checks, which significantly reduces the attack surface.

However, there are significant concerns. The plugin has a history of vulnerabilities, with one medium severity CVE currently unpatched. The common vulnerability type of 'Missing Authorization' historically is a red flag, suggesting a recurring weakness that attackers may exploit. The lack of any capability checks or nonce checks, coupled with the presence of file operations and external HTTP requests, indicates potential avenues for exploitation if authorization is not correctly implemented for these actions. The unpatched vulnerability, in particular, presents an immediate and exploitable risk.

In conclusion, while the plugin demonstrates good practices in areas like prepared statements and output escaping, the historical pattern of missing authorization vulnerabilities and the presence of an unpatched CVE, along with the absence of critical security checks like capability and nonce checks, present a notable risk. The security posture is a mix of strengths and significant weaknesses that require immediate attention, particularly regarding the unpatched vulnerability and the recurring authorization issues.

Key Concerns

  • Unpatched medium CVE
  • Historical missing authorization vulnerabilities
  • No nonce checks
  • No capability checks
Vulnerabilities
1

CryptoCloud – Crypto Payment Gateway Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-48147medium · 5.3Missing Authorization

CryptoCloud - Crypto Payment Gateway <= 2.1.2 - Missing Authorization

May 22, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

CryptoCloud – Crypto Payment Gateway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped4 total outputs
Attack Surface

CryptoCloud – Crypto Payment Gateway Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionbefore_woocommerce_initwoocryptocloud.php:16
actionplugins_loadedwoocryptocloud.php:22
actionwoocommerce_update_options_payment_gatewayswoocryptocloud.php:47
actionwoocommerce_api_wc_gateway_cryptocloudwoocryptocloud.php:50
filterwoocommerce_payment_gatewayswoocryptocloud.php:412
Maintenance & Trust

CryptoCloud – Crypto Payment Gateway Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 16, 2026
PHP min version5.6
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs400
Developer Profile

CryptoCloud – Crypto Payment Gateway Developer Profile

Crypto Cloud

1 plugin · 400 total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CryptoCloud – Crypto Payment Gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cryptocloud-crypto-payment-gateway/assets/css/cryptocloud-admin.css/wp-content/plugins/cryptocloud-crypto-payment-gateway/assets/js/cryptocloud-admin.js/wp-content/plugins/cryptocloud-crypto-payment-gateway/assets/js/cryptocloud-checkout.js

HTML / DOM Fingerprints

CSS Classes
cryptocloud-admin-settings
Data Attributes
data-cryptocloud-apikeydata-cryptocloud-merchant-iddata-cryptocloud-webhook-secret
JS Globals
cryptocloud_admin_params
REST Endpoints
/wp-json/cryptocloud/v1/settings
FAQ

Frequently Asked Questions about CryptoCloud – Crypto Payment Gateway