
Divídelo para WooCommerce Security & Risk Analysis
wordpress.org/plugins/divideloThis Divídelo plugin adds the installment simulation component for Interbank's exclusive clients.
Is Divídelo para WooCommerce Safe to Use in 2026?
Generally Safe
Score 100/100Divídelo para WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin "dividelo" v1.2 exhibits a generally strong security posture based on the static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code analysis shows no dangerous functions, no direct file operations, and all SQL queries are properly prepared, which are excellent security practices. The high percentage of properly escaped output is also a positive indicator. However, there are a few areas that warrant attention. The lack of nonce checks and capability checks is a significant concern, as it means that any entry point, if one were to be discovered or introduced, would be unprotected against various attacks like Cross-Site Request Forgery (CSRF). The presence of external HTTP requests, while not inherently insecure, represents potential vectors for attack if the targets are compromised or if the requests themselves are not handled with sufficient validation and sanitization. The plugin's vulnerability history is clean, with no recorded CVEs, which suggests a good track record of security. This, combined with the robust code practices in most areas, indicates a developer who is likely security-conscious. However, the absence of specific taint flow analysis results is a limitation, as it prevents a deeper understanding of how data moves within the plugin and if any sensitive data could be mishandled. Overall, while the plugin is currently secure due to its limited attack surface and good coding practices in critical areas, the lack of fundamental security checks like nonces and capability checks introduces an underlying risk that should be addressed.
Key Concerns
- Missing nonce checks
- Missing capability checks
- External HTTP requests present
- Low output escaping coverage (93%)
Divídelo para WooCommerce Security Vulnerabilities
Divídelo para WooCommerce Code Analysis
Output Escaping
Divídelo para WooCommerce Attack Surface
WordPress Hooks 7
Maintenance & Trust
Divídelo para WooCommerce Maintenance & Trust
Maintenance Signals
Community Trust
Divídelo para WooCommerce Alternatives
Libro de Reclamaciones y Quejas
libro-de-reclamaciones-y-quejas
Libro de reclamaciones válido para Perú con los campos obligatorios exigidos por Indecopi.
Ubigeo de Perú para Woocommerce y WordPress
ubigeo-peru
This plugin adds the Ubigeo Peru to the Woocommerce checkout - _departamento - _provincia - _distrito
Culqi
culqi-checkout
Conéctate a nuestra pasarela de pago CulqiOnline de forma segura y estable en tu tienda virtual.
YAPE A1 Tiendas
pagos-moviles-peru
Es un Plugin que permite agregar YAPE como forma de pago en tu tienda WooCommerce, YAPE es un medio de pago peruano.
Culqi Full Integracion
culqi-full-integration
Podrás hacer pagos desde Woocommerce usando el servicio de Culqi, además de reembolsos, estados, logs y personalizaciones del modal de pago.
Divídelo para WooCommerce Developer Profile
11 plugins · 9K total installs
How We Detect Divídelo para WooCommerce
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/dividelo/js/rt_dividelo.jsrt-dividelo/js/rt_dividelo.js?ver=HTML / DOM Fingerprints
dividelo_url_logojwtsubscription-key<split-payment-cta