Its Migs Security & Risk Analysis

wordpress.org/plugins/its-migs

Extends WooCommerce with MasterCard Internet Gateway Service (MIGS)

40 active installs v2.2 PHP + WP 3.5.1+ Updated Feb 20, 2024
axis-bankmastercard-internet-gateway-servicemigspayment-gatewayvisa-mastercard-plugin
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Its Migs Safe to Use in 2026?

Generally Safe

Score 85/100

Its Migs has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

Based on the static analysis and vulnerability history, the "its-migs" v2.2 plugin presents a seemingly low-risk profile. The absence of any identified attack surface (AJAX handlers, REST API routes, shortcodes, cron events) significantly reduces potential entry points for attackers. Furthermore, the code analysis shows no dangerous functions, no raw SQL queries, no file operations, and no external HTTP requests, all of which are positive security indicators. The vulnerability history is also clean, with no known CVEs or past issues. This suggests a well-developed plugin from a security perspective.

However, a critical concern arises from the output escaping analysis, where 100% of the 6 total outputs are not properly escaped. This represents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Although the static analysis did not identify specific XSS flows due to the lack of input analysis (0 taint flows analyzed), any data rendered to the user without proper escaping can be exploited. The complete lack of nonce checks and capability checks also means that if any entry points were ever introduced, they might not have adequate protection against unauthorized actions or access.

In conclusion, while the plugin excels in avoiding common attack vectors and dangerous code patterns, the unescaped output is a serious flaw that needs immediate attention. The absence of past vulnerabilities is a good sign, but it does not negate the current, identified risk. The plugin's overall security posture is weakened by the unescaped output, which could be exploited if any interaction with user-supplied data were to occur.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Its Migs Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Its Migs Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

Its Migs Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadeditsmigs.php:20
actionwoocommerce_api_itsmigsitsmigs.php:55
actionvalid-itsmigs-requestitsmigs.php:56
actionwoocommerce_update_options_payment_gatewaysitsmigs.php:64
actionwoocommerce_receipt_itsmigsitsmigs.php:67
filterwoocommerce_payment_gatewaysitsmigs.php:510
Maintenance & Trust

Its Migs Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedFeb 20, 2024
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs40
Developer Profile

Its Migs Developer Profile

itsRashad

1 plugin · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Its Migs

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/its-migs/images/its-migs.png

HTML / DOM Fingerprints

Data Attributes
data-itsmigs-id
JS Globals
itsMigsMIGSits_migs_params
REST Endpoints
/wp-json/its-migs/v1/...
FAQ

Frequently Asked Questions about Its Migs