Fake Pay For WooCommerce Security & Risk Analysis

wordpress.org/plugins/fake-pay-for-woocommerce

A simple pass-through WooCommerce payment gateway that can be used for testing orders with an admin account.

1K active installs v1.1.0 PHP 5.6+ WP 4.0+ Updated Apr 13, 2022
fakepayment-gatewaypayment-gatewaystestwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Fake Pay For WooCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

Fake Pay For WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'fake-pay-for-woocommerce' plugin v1.1.0 exhibits a strong security posture. The code analysis reveals a complete absence of dangerous functions, SQL injection vulnerabilities, file operations, and external HTTP requests. Furthermore, all SQL queries utilize prepared statements, and output is properly escaped, minimizing common attack vectors. The plugin also has no identified CVEs, indicating a lack of historical security issues.

While the plugin has a limited attack surface with no exposed AJAX handlers, REST API routes, or shortcodes without proper authorization, it's worth noting the absence of nonce checks on any potential entry points. The presence of two capability checks is a positive sign, but the lack of any identified taint flows, while seemingly good, could also indicate that the analysis might not have been comprehensive enough to uncover subtle data flow issues. However, given the other positive indicators, this is less of a concern.

In conclusion, the plugin appears to be well-developed from a security perspective, with a strong emphasis on preventing common web vulnerabilities. The absence of known vulnerabilities and the secure coding practices employed are significant strengths. The primary area for potential improvement lies in ensuring robust authorization and nonce checks across all potential entry points, even if the current analysis shows none.

Key Concerns

  • No nonce checks on potential entry points
Vulnerabilities
None known

Fake Pay For WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Fake Pay For WooCommerce Release Timeline

v1.1.0Current
Code Analysis
Analyzed Mar 16, 2026

Fake Pay For WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Fake Pay For WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionplugins_loadedmain.php:11
filterwoocommerce_payment_gatewaysmain.php:13
Maintenance & Trust

Fake Pay For WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedApr 13, 2022
PHP min version5.6
Downloads16K

Community Trust

Rating92/100
Number of ratings8
Active installs1K
Developer Profile

Fake Pay For WooCommerce Developer Profile

agraddy

3 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Fake Pay For WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Fake Pay For WooCommerce