KueskiPay Gateway Security & Risk Analysis

wordpress.org/plugins/kueskipay-gateway

Add Kueski gateway to buy now and pay later on your store.

200 active installs v2.4.1 PHP 7.4+ WP 6.2+ Updated Jan 19, 2026
e-commerceecommercekueskipayment-gatewaywoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is KueskiPay Gateway Safe to Use in 2026?

Generally Safe

Score 100/100

KueskiPay Gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The kueskipay-gateway plugin version 2.4.1 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by exclusively using prepared statements for SQL queries and having a very high rate of properly escaped output. It also has no known vulnerabilities (CVEs) recorded, suggesting a history of stable and secure development.

However, significant security concerns arise from the attack surface analysis. The plugin has two identified entry points: one AJAX handler and one REST API route. Crucially, both of these entry points lack proper authentication and permission checks, making them directly accessible to unauthenticated users. This is a critical security flaw that could lead to unauthorized actions or data exposure. While taint analysis shows no immediate risks, the presence of unprotected entry points is a substantial vulnerability regardless of specific taint flows being identified.

In conclusion, while the plugin's handling of SQL and output escaping is commendable, the absence of authentication checks on its AJAX and REST API endpoints represents a major security weakness. This oversight significantly increases the risk profile and should be addressed immediately. The lack of historical vulnerabilities is a positive indicator, but it does not mitigate the immediate risks posed by the exposed entry points.

Key Concerns

  • AJAX handler without auth check
  • REST API route without permission callback
Vulnerabilities
None known

KueskiPay Gateway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

KueskiPay Gateway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
122 escaped
Nonce Checks
2
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

99% escaped123 total outputs
Attack Surface
2 unprotected

KueskiPay Gateway Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 1

authwp_ajax_kueski_process_refundincludes\class-wc-kueski.php:155

REST API Routes 1

GET/wp-json/kueski/v1/monitoringincludes\class-wc-kueski-gateway-rest-api.php:16
WordPress Hooks 22
actionplugins_loadedincludes\class-wc-kueski.php:86
filterwoocommerce_payment_gatewaysincludes\class-wc-kueski.php:93
actionplugins_loadedincludes\class-wc-kueski.php:94
actionadd_meta_boxesincludes\class-wc-kueski.php:98
actionenqueue_block_assetsincludes\class-wc-kueski.php:106
actioninitincludes\class-wc-kueski.php:107
filterrender_blockincludes\class-wc-kueski.php:108
actionwp_enqueue_scriptsincludes\class-wc-kueski.php:113
actionwoocommerce_proceed_to_checkoutincludes\class-wc-kueski.php:114
actionwoocommerce_proceed_to_checkoutincludes\class-wc-kueski.php:116
actionwp_footerincludes\class-wc-kueski.php:117
actiontemplate_redirectincludes\class-wc-kueski.php:119
actioninitincludes\class-wc-kueski.php:121
actionrest_api_initincludes\class-wc-kueski.php:122
filtercron_schedulesincludes\class-wc-kueski.php:130
actionisa_add_every_kueski_syncincludes\class-wc-kueski.php:143
actionadd_meta_boxesincludes\class-wc-kueski.php:153
actionadmin_enqueue_scriptsincludes\class-wc-kueski.php:154
actionbefore_woocommerce_initkueski-gateway.php:61
actionwoocommerce_blocks_loadedkueski-gateway.php:62
actionbefore_woocommerce_initkueski-gateway.php:64
actionwoocommerce_blocks_payment_method_type_registrationkueski-gateway.php:82

Scheduled Events 1

isa_add_every_kueski_sync
Maintenance & Trust

KueskiPay Gateway Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 19, 2026
PHP min version7.4
Downloads4K

Community Trust

Rating30/100
Number of ratings2
Active installs200
Developer Profile

KueskiPay Gateway Developer Profile

edgarnomesque

1 plugin · 200 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect KueskiPay Gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/kueskipay-gateway/assets/js/kueski-checkout-gateway.js/wp-content/plugins/kueskipay-gateway/assets/js/kueski-gateway.js/wp-content/plugins/kueskipay-gateway/assets/css/kueski-gateway.css
Script Paths
/wp-content/plugins/kueskipay-gateway/assets/js/kueski-checkout-gateway.js/wp-content/plugins/kueskipay-gateway/assets/js/kueski-gateway.js
Version Parameters
kueskipay-gateway/assets/js/kueski-checkout-gateway.js?ver=kueskipay-gateway/assets/js/kueski-gateway.js?ver=kueskipay-gateway/assets/css/kueski-gateway.css?ver=

HTML / DOM Fingerprints

CSS Classes
kueski-list-table
HTML Comments
<!-- KUESKI GATEWAY: Payment form --><!-- KUESKI GATEWAY: Payment form end -->
Data Attributes
data-kueski-init
JS Globals
kueski_payment_params
REST Endpoints
/wp-json/kueski-gateway/v1/payment
Shortcode Output
[kueski_pay_button]
FAQ

Frequently Asked Questions about KueskiPay Gateway