[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fxSfR8ZqFJwqIpQZ6K4dFPJrvPIGWWJqz1woplnoKZDA":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":16,"requires_php":17,"tags":18,"homepage":24,"download_link":25,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28,"vulnerabilities":29,"developer":30,"crawl_stats":27,"alternatives":37,"analysis":38,"fingerprints":126},"min-and-max-order-amount-for-woo-payment-gateways","Minimum and Maximum Order Amount for WooCommerce Payment Gateways","2.0.0","Raihan","https:\u002F\u002Fprofiles.wordpress.org\u002Fwdraihan\u002F","\u003Cp>Restrict users from using a specific WooCommerce payment gateway based on minimum or maximum order amounts.\u003Cbr \u002F>\nYou can easily establish minimum and maximum order amounts for WooCommerce payment gateways.\u003C\u002Fp>\n\u003Cp>👉 Demo Link: \u003Ca href=\"https:\u002F\u002Fmmawpg.wdraihan.com\u002F\" rel=\"nofollow ugc\">Live Preview\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>With this plugin, you can establish both minimum and maximum order amounts for WooCommerce payment gateways. By defining an order limit for a particular payment gateway, users will be unable to complete an order using that payment method unless the cart total aligns with the specified limit.\u003C\u002Fp>\n\u003Cp>This plugin offers the flexibility to set minimum or maximum order amounts for \u003Cstrong>any WooCommerce payment gateway\u003C\u002Fstrong>, including options like Cash on Delivery, Check Payment, Direct Bank Transfer, PayPal, Stripe, and more. You can dynamically enable or disable these methods based on whether the total order amount falls below $xxx or exceeds $xxx.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Conditional payment gateways:\u003C\u002Fstrong>\u003Cbr \u002F>\nIf you wish to enable customers to use WooCommerce payment gateways conditionally based on the customer’s order amount, you can easily achieve this with our plugin.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Minimum or Maximum order amount for Cash On Delivery:\u003C\u002Fstrong>\u003Cbr \u002F>\nIf you wish to restrict or allow ‘Cash On Delivery’ payments based on a minimum or maximum order amount, this can be easily achieved using this plugin.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Minimum or Maximum order amount for Paypal:\u003C\u002Fstrong>\u003Cbr \u002F>\nIf you desire to accept payments via ‘PayPal’ and set specific minimum or maximum order amounts, you can easily achieve this using this plugin\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Minimum or Maximum order amount for Stripe:\u003C\u002Fstrong>\u003Cbr \u002F>\nIf you wish to accept payments through ‘Stripe’ and set specific minimum or maximum order amounts, you can easily configure it using this plugin.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Minimum or Maximum order amount for Check payment:\u003C\u002Fstrong>\u003Cbr \u002F>\nIf you wish to accept payments via ‘Check’ and set specific minimum or maximum order amounts, you can easily configure it using this plugin.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Minimum or Maximum order amount for Direct bank transfer:\u003C\u002Fstrong>\u003Cbr \u002F>\nIf you wish to accept payments via ‘Bank’ and set specific minimum or maximum order amounts, you can easily configure it using this plugin.\u003C\u002Fp>\n","Restrict users from using a specific WooCommerce payment gateway based on minimum or maximum order amounts.",70,2577,0,"2025-02-13T05:57:00.000Z","6.7.5","4.2","4.3",[19,20,21,22,23],"conditional-payment-gateway","maximum-payment","min-and-max-price-for-order","min-max-order-amount","minimum-payment","https:\u002F\u002Fmmawpg.wdraihan.com\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fmin-and-max-order-amount-for-woo-payment-gateways.2.0.0.zip",92,null,"2026-03-15T15:16:48.613Z",[],{"slug":31,"display_name":7,"profile_url":8,"plugin_count":32,"total_installs":33,"avg_security_score":26,"avg_patch_time_days":34,"trust_score":35,"computed_at":36},"wdraihan",3,470,30,88,"2026-04-04T13:03:30.225Z",[],{"attackSurface":39,"codeSignals":102,"taintFlows":113,"riskAssessment":114,"analyzedAt":125},{"hooks":40,"ajaxHandlers":82,"restRoutes":89,"shortcodes":90,"cronEvents":99,"entryPointCount":100,"unprotectedCount":101},[41,48,52,55,58,62,66,71,75,79],{"type":42,"name":43,"callback":44,"priority":45,"file":46,"line":47},"filter","woocommerce_settings_tabs_array","anonymous",50,"includes\\class-mmawpg-admin-options.php",9,{"type":49,"name":50,"callback":44,"file":46,"line":51},"action","woocommerce_settings_tabs_mmawpg_settings_tab",10,{"type":49,"name":53,"callback":44,"file":46,"line":54},"woocommerce_update_options_mmawpg_settings_tab",11,{"type":42,"name":56,"callback":44,"priority":51,"file":46,"line":57},"mmawpg_wc_settings_tab",12,{"type":42,"name":59,"callback":60,"priority":51,"file":61,"line":47},"woocommerce_order_button_html","mmawpg_woo_place_order_btn_html","includes\\class-mmawpg-functions.php",{"type":49,"name":63,"callback":64,"file":61,"line":65},"woocommerce_review_order_before_submit","mmawpg_before_submit_btn",14,{"type":49,"name":67,"callback":68,"file":69,"line":70},"plugins_loaded","mmawpg_load_textdomain","mmawpg.php",27,{"type":49,"name":72,"callback":73,"file":69,"line":74},"wp_enqueue_scripts","mmawpg_enqueue_all_scripts",34,{"type":49,"name":76,"callback":77,"file":69,"line":78},"admin_notices","mmawpg_lite_woo_active_notice",75,{"type":49,"name":67,"callback":80,"file":69,"line":81},"mmawpg_lite_plugin_loaded",79,[83,87],{"action":84,"nopriv":85,"callback":86,"hasNonce":85,"hasCapCheck":85,"file":61,"line":54},"mmawpg_ajax_action",false,"mmawpg_ajax_action_callback",{"action":84,"nopriv":88,"callback":86,"hasNonce":85,"hasCapCheck":85,"file":61,"line":57},true,[],[91,95],{"tag":92,"callback":93,"file":61,"line":94},"mmawpg_amount","mmawpg_amount_scode",153,{"tag":96,"callback":97,"file":61,"line":98},"mmawpg_method","mmawpg_method_scode",179,[],4,2,{"dangerousFunctions":103,"sqlUsage":104,"outputEscaping":106,"fileOperations":13,"externalRequests":13,"nonceChecks":13,"capabilityChecks":13,"bundledLibraries":112},[],{"prepared":13,"raw":13,"locations":105},[],{"escaped":107,"rawEcho":101,"locations":108},1,[109,111],{"file":69,"line":11,"context":110},"raw output",{"file":69,"line":11,"context":110},[],[],{"summary":115,"deductions":116},"This plugin exhibits a mixed security posture, with some positive indicators but notable areas of concern. On the positive side, the absence of known CVEs and dangerous functions, along with the exclusive use of prepared statements for SQL queries, are strong indicators of good development practices. The lack of file operations and external HTTP requests also reduces potential attack vectors.\n\nHowever, the static analysis reveals significant security weaknesses. The presence of two AJAX handlers without authentication checks creates a substantial and unprotected attack surface. Furthermore, the low percentage of properly escaped output (33%) suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities. The complete lack of nonce checks on AJAX handlers exacerbates the risk associated with the unprotected entry points. The taint analysis showing zero flows analyzed is not necessarily a strength, as it might indicate insufficient testing or a limited scope for the analysis itself, rather than a confirmed absence of vulnerabilities.\n\nThe vulnerability history being entirely clear is a positive sign, suggesting the developers have a good track record or the plugin hasn't been a target of past vulnerabilities. However, this should not overshadow the clear and present risks identified in the static analysis. The conclusion is that while the plugin has a clean historical record, the current version has critical security flaws in its handling of AJAX requests and output sanitization, which require immediate attention to mitigate potential exploitation.",[117,119,122],{"reason":118,"points":51},"AJAX handlers without auth checks",{"reason":120,"points":121},"Low output escaping percentage",8,{"reason":123,"points":124},"No nonce checks on AJAX",7,"2026-03-16T21:33:36.569Z",{"wat":127,"direct":134},{"assetPaths":128,"generatorPatterns":130,"scriptPaths":131,"versionParams":133},[129],"\u002Fwp-content\u002Fplugins\u002Fmin-and-max-order-amount-for-woo-payment-gateways\u002Fassets\u002Fjs\u002Fmmawpg-scripts.js",[],[132],"mmawpg-scripts.js",[],{"cssClasses":135,"htmlComments":136,"htmlAttributes":137,"restEndpoints":139,"jsGlobals":141,"shortcodeOutput":143},[],[],[138],"data-value",[140],"\u002Fwp-json\u002Fmmawpg\u002Fv1\u002Fsettings",[142],"mmawpg_ajax_object",[]]