Dojo for WooCommerce Security & Risk Analysis

wordpress.org/plugins/dojo-for-woocommerce

Extends WooCommerce, allowing you to take payments via Dojo.

800 active installs v2.1.0 PHP 7.4+ WP 5.0+ Updated Jan 14, 2026
checkoutdojopayment-gatewaypaymentswoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Dojo for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

Dojo for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The dojo-for-woocommerce plugin, version 2.1.0, exhibits a generally strong security posture based on the provided static analysis. The absence of identified dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), and a high percentage of properly escaped output are positive indicators. Furthermore, the lack of known vulnerabilities in its history suggests a stable and well-maintained codebase. The plugin also demonstrates minimal attack surface with no direct AJAX handlers, REST API routes, or shortcodes exposed without authentication, and only one cron event which is likely managed internally.

However, several areas present potential concerns that warrant attention. The absence of nonce checks across all entry points, coupled with a complete lack of capability checks, leaves the plugin vulnerable to potential cross-site request forgery (CSRF) and authorization bypass attacks if any of its internal functions were to be triggered externally without proper validation. The presence of external HTTP requests, while not inherently a vulnerability, could become one if the data sent or received is not handled securely, especially in the absence of input validation or output escaping on the responses. The zero taint analysis flows and zero total flows analyzed is also a notable absence; while it might indicate a clean codebase, it could also mean the taint analysis was incomplete or not configured to detect specific types of vulnerabilities. This means potential vulnerabilities might have been missed.

In conclusion, dojo-for-woocommerce v2.1.0 appears to be a relatively secure plugin with good coding practices concerning direct web vulnerabilities. Its vulnerability history is clean. The primary areas of concern lie in the complete lack of nonce and capability checks, which are fundamental security measures for any WordPress plugin. While the current static analysis doesn't reveal immediate critical flaws, these omissions represent significant potential weaknesses that could be exploited. The minimal attack surface is a strength, but it does not negate the need for robust authorization and anti-CSRF mechanisms.

Key Concerns

  • Missing nonce checks on all entry points
  • Missing capability checks on all entry points
  • Zero taint flows analyzed
Vulnerabilities
None known

Dojo for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Dojo for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
68 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
4
Bundled Libraries
0

Output Escaping

97% escaped70 total outputs
Attack Surface

Dojo for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
filterwoocommerce_payment_gatewaysdojo-for-woocommerce.php:74
filterallowed_redirect_hostsdojo-for-woocommerce.php:90
actionplugins_loadeddojo-for-woocommerce.php:102
actionbefore_woocommerce_initdojo-for-woocommerce.php:105
actionplugins_loadeddojo-for-woocommerce.php:112
actionwoocommerce_blocks_loadeddojo-for-woocommerce.php:119
actionwoocommerce_blocks_payment_method_type_registrationdojo-for-woocommerce.php:126
actiondojo_process_webhook_eventincludes\class-wc-dojo-webhooks-processor.php:189

Scheduled Events 1

dojo_process_webhook_event
Maintenance & Trust

Dojo for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 14, 2026
PHP min version7.4
Downloads12K

Community Trust

Rating100/100
Number of ratings1
Active installs800
Developer Profile

Dojo for WooCommerce Developer Profile

dojopayments

1 plugin · 800 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Dojo for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dojo-for-woocommerce/assets/css/dojo-style.css/wp-content/plugins/dojo-for-woocommerce/assets/js/dojo-checkout.js
Script Paths
/wp-content/plugins/dojo-for-woocommerce/assets/js/dojo-checkout.js
Version Parameters
dojo-for-woocommerce/assets/css/dojo-style.css?ver=dojo-for-woocommerce/assets/js/dojo-checkout.js?ver=

HTML / DOM Fingerprints

CSS Classes
dojo-checkout-containerdojo-payment-form
HTML Comments
<!-- Dojo payment form start --><!-- Dojo payment form end -->
Data Attributes
data-dojo-payment-intent-iddata-dojo-checkout-url
JS Globals
dojoCheckoutConfigDojoCheckout
Shortcode Output
[dojo_checkout_form]
FAQ

Frequently Asked Questions about Dojo for WooCommerce