Jigoshop Credimax Security & Risk Analysis

wordpress.org/plugins/jigoshop-credimax

This plugin extends the Jigoshop payment gateways to add in Credimax Payment Gateway.

10 active installs v1.0.0 PHP + WP 3.2+ Updated Feb 22, 2015
cartcheckoutecommercegatewayjigoshoppayment
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Jigoshop Credimax Safe to Use in 2026?

Generally Safe

Score 85/100

Jigoshop Credimax has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "jigoshop-credimax" v1.0.0 plugin exhibits a mixed security posture. On the positive side, the static analysis reveals no known CVEs, dangerous functions, raw SQL queries, file operations, external HTTP requests, or bundled libraries. This suggests a developer who is aware of common security pitfalls and has taken steps to mitigate them. The plugin also boasts a zero-entry point attack surface, meaning there are no directly accessible AJAX handlers, REST API routes, shortcodes, or cron events exposed without proper authentication or authorization.

However, significant concerns arise from the taint analysis and output escaping. Three total flows were analyzed, and all three were found to have "unsanitized paths." While no critical or high severity issues were flagged in the taint analysis, the presence of any unsanitized paths is a red flag, indicating potential for unexpected behavior or information disclosure. Furthermore, only 25% of output escaping was properly handled, leaving a substantial portion of the plugin's output potentially vulnerable to cross-site scripting (XSS) attacks. The absence of any nonce or capability checks, while not directly exploited due to the limited attack surface, points to a lack of defense-in-depth, which could become a problem if new entry points are introduced or existing ones are inadvertently exposed.

Overall, the plugin benefits from a clean vulnerability history and avoidance of many common risky coding practices. However, the identified issues with unsanitized paths and insufficient output escaping present tangible risks that require attention. The lack of explicit permission checks, while not currently exploitable, represents a potential weakness if the attack surface were to expand. The plugin is in a decent state regarding known vulnerabilities, but the code-level findings of unsanitized data and poor output handling are genuine security weaknesses.

Key Concerns

  • Unsanitized paths found in taint analysis
  • Low percentage of properly escaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Jigoshop Credimax Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Jigoshop Credimax Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Jigoshop Credimax Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

25% escaped4 total outputs
Data Flows · Security
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
jigoshop_credimax_payment_gateway (jigoshop-credimax.php:32)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Jigoshop Credimax Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitjigoshop-credimax.php:68
actionjigoshop_update_optionsjigoshop-credimax.php:69
actionvalid_credimax_requestjigoshop-credimax.php:70
actionreceipt_credimax_gatewayjigoshop-credimax.php:71
filterjigoshop_payment_gatewaysjigoshop-credimax.php:591
actionplugins_loadedjigoshop-credimax.php:594
Maintenance & Trust

Jigoshop Credimax Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedFeb 22, 2015
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Jigoshop Credimax Developer Profile

Ali Ashoor

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Jigoshop Credimax

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/jigoshop-credimax/images/icon.png

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Jigoshop Credimax