Depix – PIX Payment Gateway for WooCommerce Security & Risk Analysis

wordpress.org/plugins/depix-gateway

Native PIX payment gateway for WooCommerce. No monthly fees and no chargeback risk after settlement.

0 active installs v0.4.2 PHP 8.1+ WP 6.0+ Updated Mar 24, 2026
brazilinstant-paymentpayment-gatewaypixwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Depix – PIX Payment Gateway for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

Depix – PIX Payment Gateway for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The depix-gateway plugin v0.4.2 demonstrates a generally strong security posture, primarily due to the absence of known vulnerabilities and the developer's apparent adherence to secure coding practices. The static analysis reveals a commendably small attack surface with no identified unprotected entry points like AJAX handlers or REST API routes. Furthermore, the code exclusively uses prepared statements for its SQL queries and properly escapes all output, which are crucial defenses against common web vulnerabilities. The presence of a capability check also indicates a conscious effort to implement access control.

However, a closer look at the static analysis reveals areas that warrant caution. The taint analysis identified two flows with unsanitized paths. While no critical or high severity issues were flagged, the mere presence of such flows suggests a potential for unintended data handling or path manipulation if input is not rigorously validated and sanitized before use. Additionally, the complete absence of nonce checks across all entry points is a significant concern. Nonces are a fundamental WordPress security mechanism for preventing Cross-Site Request Forgery (CSRF) attacks, and their omission leaves the plugin vulnerable to such threats, especially if any actions were to be performed on the backend that modify data or settings.

The vulnerability history of zero known CVEs is a positive indicator, suggesting a history of secure development or a lack of past exploitation. Combined with the current lack of unpatched vulnerabilities, this points to a plugin that has, to date, been resilient. However, the absence of nonce checks represents a fundamental weakness that could be exploited regardless of past vulnerability records. In conclusion, while the plugin benefits from strong output escaping, prepared SQL statements, and a clean vulnerability history, the presence of unsanitized path flows and the critical lack of nonce checks are significant security concerns that require immediate attention to mitigate potential risks.

Key Concerns

  • Unsanitized path flows identified in taint analysis
  • Missing nonce checks
Vulnerabilities
None known

Depix – PIX Payment Gateway for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Depix – PIX Payment Gateway for WooCommerce Release Timeline

v0.4.2Current
v0.4.1
v0.4.0
v0.3.2
Code Analysis
Analyzed Apr 16, 2026

Depix – PIX Payment Gateway for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
0
80 escaped
Nonce Checks
0
Capability Checks
1
File Operations
1
External Requests
2
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

100% escaped80 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
payment_fields (includes/class-depix-gateway-gateway.php:41)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Depix – PIX Payment Gateway for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
actionbefore_woocommerce_initdepix-gateway.php:42
actionbefore_woocommerce_initdepix-gateway.php:56
actionadmin_noticesdepix-gateway.php:536
filterwoocommerce_payment_gatewaysdepix-gateway.php:545
actionwoocommerce_order_status_changeddepix-gateway.php:555
actiondepix_wp_poll_payment_statusdepix-gateway.php:558
actiondepix_wp_poll_payment_status_crondepix-gateway.php:561
actionplugins_loadeddepix-gateway.php:565
actionwoocommerce_blocks_payment_method_type_registrationdepix-gateway.php:577
actionwoocommerce_blocks_loadeddepix-gateway.php:584
actionwoocommerce_thankyou_depix_pixincludes/class-depix-gateway-display.php:23
actionwoocommerce_view_orderincludes/class-depix-gateway-display.php:26
actionwoocommerce_email_order_detailsincludes/class-depix-gateway-display.php:29
actionwoocommerce_api_depix_webhookincludes/class-depix-gateway-webhook-handler.php:27
Maintenance & Trust

Depix – PIX Payment Gateway for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 24, 2026
PHP min version8.1
Downloads96

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Depix – PIX Payment Gateway for WooCommerce Developer Profile

Equipe Suporte

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Depix – PIX Payment Gateway for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/depix-gateway/assets/css/depix-gateway-checkout.css/wp-content/plugins/depix-gateway/assets/js/depix-gateway-checkout.js
Script Paths
/wp-content/plugins/depix-gateway/assets/js/depix-gateway-checkout.js
Version Parameters
depix-gateway/assets/css/depix-gateway-checkout.css?ver=depix-gateway/assets/js/depix-gateway-checkout.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-depix-payment-id
JS Globals
depix_gateway_params
Shortcode Output
<!-- PIX Payment QR Code -->
FAQ

Frequently Asked Questions about Depix – PIX Payment Gateway for WooCommerce