eProcessing Network Payment Gateway for WooCommerce Security & Risk Analysis

wordpress.org/plugins/epn-woocommerce-addon

This plugin is an addon for WooCommerce to implement a payment gateway method for accepting Credit Cards Payments By merchants via eProcessing Network …

80 active installs v1.0 PHP + WP + Updated Sep 11, 2017
authorize-net-emulationeprocessing-network-woocommerce-addoneprocessing-network-woocommerce-plugin
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is eProcessing Network Payment Gateway for WooCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

eProcessing Network Payment Gateway for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The static analysis of 'epn-woocommerce-addon' v1.0 reveals a seemingly robust security posture with no identified dangerous functions, SQL queries without prepared statements, or improperly escaped output. The absence of any file operations or external HTTP requests (excluding one, see below) also contributes positively. However, the complete lack of nonces and capability checks across all entry points is a significant concern, especially given the presence of an external HTTP request. This indicates a potential for security weaknesses if any of the entry points were to be exploited or if the external request is not handled securely. The plugin's vulnerability history is clean, with no recorded CVEs, which is a strong positive indicator. This suggests a history of secure development or a lack of prior scrutiny for critical vulnerabilities. Overall, while the code demonstrates good practices in areas like SQL and output handling, the critical absence of authentication and authorization mechanisms represents a notable risk that needs to be addressed.

Key Concerns

  • Missing nonce checks on all entry points
  • Missing capability checks on all entry points
  • Unprotected external HTTP request
Vulnerabilities
None known

eProcessing Network Payment Gateway for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

eProcessing Network Payment Gateway for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped7 total outputs
Attack Surface

eProcessing Network Payment Gateway for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterwoocommerce_payment_gatewaysepn-woocommerce-addon.php:21
actionplugins_loadedepn-woocommerce-addon.php:368
Maintenance & Trust

eProcessing Network Payment Gateway for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedSep 11, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs80
Developer Profile

eProcessing Network Payment Gateway for WooCommerce Developer Profile

syednazrulhassan

10 plugins · 540 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect eProcessing Network Payment Gateway for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/epn-woocommerce-addon/images/amex.png/wp-content/plugins/epn-woocommerce-addon/images/dinersclub.png/wp-content/plugins/epn-woocommerce-addon/images/discover.png/wp-content/plugins/epn-woocommerce-addon/images/jcb.png/wp-content/plugins/epn-woocommerce-addon/images/mastercard.png/wp-content/plugins/epn-woocommerce-addon/images/visa.png/wp-content/plugins/epn-woocommerce-addon/images/epn.png

HTML / DOM Fingerprints

Data Attributes
id="epn_lightweight"
FAQ

Frequently Asked Questions about eProcessing Network Payment Gateway for WooCommerce