
Jigoshop Credimax Security & Risk Analysis
wordpress.org/plugins/jigoshop-credimaxThis plugin extends the Jigoshop payment gateways to add in Credimax Payment Gateway.
Is Jigoshop Credimax Safe to Use in 2026?
Generally Safe
Score 85/100Jigoshop Credimax has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "jigoshop-credimax" v1.0.0 plugin exhibits a mixed security posture. On the positive side, the static analysis reveals no known CVEs, dangerous functions, raw SQL queries, file operations, external HTTP requests, or bundled libraries. This suggests a developer who is aware of common security pitfalls and has taken steps to mitigate them. The plugin also boasts a zero-entry point attack surface, meaning there are no directly accessible AJAX handlers, REST API routes, shortcodes, or cron events exposed without proper authentication or authorization.
However, significant concerns arise from the taint analysis and output escaping. Three total flows were analyzed, and all three were found to have "unsanitized paths." While no critical or high severity issues were flagged in the taint analysis, the presence of any unsanitized paths is a red flag, indicating potential for unexpected behavior or information disclosure. Furthermore, only 25% of output escaping was properly handled, leaving a substantial portion of the plugin's output potentially vulnerable to cross-site scripting (XSS) attacks. The absence of any nonce or capability checks, while not directly exploited due to the limited attack surface, points to a lack of defense-in-depth, which could become a problem if new entry points are introduced or existing ones are inadvertently exposed.
Overall, the plugin benefits from a clean vulnerability history and avoidance of many common risky coding practices. However, the identified issues with unsanitized paths and insufficient output escaping present tangible risks that require attention. The lack of explicit permission checks, while not currently exploitable, represents a potential weakness if the attack surface were to expand. The plugin is in a decent state regarding known vulnerabilities, but the code-level findings of unsanitized data and poor output handling are genuine security weaknesses.
Key Concerns
- Unsanitized paths found in taint analysis
- Low percentage of properly escaped output
- Missing nonce checks
- Missing capability checks
Jigoshop Credimax Security Vulnerabilities
Jigoshop Credimax Release Timeline
Jigoshop Credimax Code Analysis
Output Escaping
Data Flow Analysis
Jigoshop Credimax Attack Surface
WordPress Hooks 6
Maintenance & Trust
Jigoshop Credimax Maintenance & Trust
Maintenance Signals
Community Trust
Jigoshop Credimax Alternatives
Jigoshop Custom Payment Gateway
jigoshop-custom-payment-gateway
This plugin adds a simple custom payment gateway similar to the "Cheque" gateway that can be molded for your projects.
FluentCart A New Era of eCommerce – Faster, Lighter, and Simpler
fluent-cart
Sell Subscriptions, Physical Products, Digital Downloads easier than ever. Built for performance, scalability, and flexibility.
Payment Button for PayPal
wp-paypal
Easily accept payment in WordPress by adding a PayPal button to your website. Add PayPal Buy Now, Add to Cart, Subscription or Donation button.
Livees Checkout
livees-checkout
Livees Checkout® Más que una pasarela de pagos: el puente definitivo entre tu negocio y todos los medios electrónicos regulados por ASFI.
PayPal For Easy Digital Downloads (EDD)
pal-for-edd
PayPal for Easy Digital Downloads. Develop by Official PayPal Partner.
Jigoshop Credimax Developer Profile
1 plugin · 10 total installs
How We Detect Jigoshop Credimax
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/jigoshop-credimax/images/icon.png