Foloosi Payments Security & Risk Analysis

wordpress.org/plugins/foloosi-for-woocommerce

Foloosi Payments plugin to accept credit card and debit payments.

100 active installs v1.2.1 PHP 7.4+ WP 3.9.2+ Updated Apr 10, 2023
cardfoloosipaymentsuae
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Foloosi Payments Safe to Use in 2026?

Generally Safe

Score 85/100

Foloosi Payments has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The static analysis of foloosi-for-woocommerce v1.2.1 reveals a plugin with an extremely small attack surface, reporting zero AJAX handlers, REST API routes, shortcodes, and cron events. This is a strong indicator of a plugin that is not actively exposing entry points that could be directly exploited. The code also demonstrates good practices in handling SQL queries with 100% usage of prepared statements and shows a moderate level of output escaping. However, there are significant concerns regarding the lack of security checks. The absence of nonce checks and capability checks is particularly worrying, as it means that even if some actions were to be triggered, they would not be protected against CSRF attacks or unauthorized access based on user roles. Furthermore, the taint analysis identified two flows with unsanitized paths, which, while not classified as critical or high, represent potential avenues for attackers to introduce malicious data or manipulate file operations if other components were to interact with these unsanitized paths. The plugin's vulnerability history is clean, which is positive, but this, combined with the current analysis, suggests a lack of exposure or a very limited feature set that has not yet attracted vulnerabilities. The presence of external HTTP requests without clear authentication or sanitization could also be a point of concern depending on their purpose and destination.

Key Concerns

  • No nonce checks detected
  • No capability checks detected
  • Unsanitized paths in taint analysis
  • Moderate output escaping (67%)
Vulnerabilities
None known

Foloosi Payments Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Foloosi Payments Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
4
Bundled Libraries
0

Output Escaping

67% escaped6 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
foloosiwebhookupdateorder (foloosi-payments.php:17)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Foloosi Payments Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedfoloosi-payments.php:15
actioninitfoloosi-payments.php:16
actioninitfoloosi-payments.php:154
actionwoocommerce_update_options_payment_gatewaysfoloosi-payments.php:165
filterwoocommerce_payment_gatewaysfoloosi-payments.php:682
Maintenance & Trust

Foloosi Payments Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedApr 10, 2023
PHP min version7.4
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Foloosi Payments Developer Profile

foloosi

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Foloosi Payments

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/foloosi-for-woocommerce/foloosi-payment-gateway.php

HTML / DOM Fingerprints

Data Attributes
foloosi_wc_order_idfoloosi_payment_idfoloosi_order_idfoloosi_reference_idfoloosi_woo_order_id
REST Endpoints
woocommerce_api_foloosi
FAQ

Frequently Asked Questions about Foloosi Payments