
Due.com E-Commerce Payment Gateway Security & Risk Analysis
wordpress.org/plugins/duecom-e-commerce-payment-gatewayBe sure to checkout our tutorial on using this plugin.
Is Due.com E-Commerce Payment Gateway Safe to Use in 2026?
Generally Safe
Score 85/100Due.com E-Commerce Payment Gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'duecom-e-commerce-payment-gateway' plugin version 1.4.4 exhibits a strong security posture based on the provided static analysis. The absence of identified dangerous functions, external HTTP requests, file operations, and SQL queries that do not use prepared statements indicates good coding practices. The taint analysis showing zero flows with unsanitized paths further reinforces this positive assessment. The plugin also has a clean vulnerability history with no recorded CVEs, suggesting a consistent effort towards maintaining security.
However, there are areas for improvement. A significant concern is the complete lack of capability checks and nonce checks. This implies that many operations within the plugin might be accessible to users without proper authorization, especially if new entry points are introduced in future versions. While the current attack surface is zero, relying on this without inherent permission checks is a risky assumption. The unescaped output rate, while not critical, also presents a potential area for Cross-Site Scripting (XSS) vulnerabilities if malicious data is not properly handled by the theme or other plugins interacting with these outputs.
In conclusion, the plugin is currently in a good state with no identified critical vulnerabilities and a history of stability. The developers have employed several good security practices. Nevertheless, the complete absence of capability and nonce checks on all entry points, despite the current zero attack surface, represents a significant oversight that could lead to vulnerabilities if the attack surface expands or if unexpected interactions occur. The unescaped output, while minor, should also be addressed for complete robustness.
Key Concerns
- No nonce checks implemented
- No capability checks implemented
- 25% of output not properly escaped
Due.com E-Commerce Payment Gateway Security Vulnerabilities
Due.com E-Commerce Payment Gateway Code Analysis
Output Escaping
Due.com E-Commerce Payment Gateway Attack Surface
WordPress Hooks 10
Maintenance & Trust
Due.com E-Commerce Payment Gateway Maintenance & Trust
Maintenance Signals
Community Trust
Due.com E-Commerce Payment Gateway Alternatives
No alternatives data available yet.
Due.com E-Commerce Payment Gateway Developer Profile
4 plugins · 30 total installs
How We Detect Due.com E-Commerce Payment Gateway
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/duecom-e-commerce-payment-gateway/assets/css/style.css