
mPandco Security & Risk Analysis
wordpress.org/plugins/mpandcomPandco payment gateway compatible with woocommerce.
Is mPandco Safe to Use in 2026?
Generally Safe
Score 85/100mPandco has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin "mpandco" v1.0.11 exhibits a mixed security posture. On the positive side, the absence of known CVEs, a limited attack surface, and the exclusive use of prepared statements for SQL queries are strong indicators of good development practices. The plugin also appears to have no external HTTP requests or file operations, further reducing potential attack vectors. However, significant concerns arise from the static analysis. The presence of two 'unserialize' calls without any apparent authorization or nonce checks is a critical risk, potentially leading to Remote Code Execution or other severe vulnerabilities if an attacker can control the serialized data. Furthermore, the low percentage of properly escaped output (5%) suggests a high likelihood of Cross-Site Scripting (XSS) vulnerabilities across various output contexts. The lack of explicit capability checks and nonce checks on entry points, although the attack surface is currently zero, means any future addition of functionality without proper security considerations would be immediately vulnerable.
While the vulnerability history is clean, this should not be interpreted as a guarantee of future security. The "unserialize" and poor output escaping are fundamental security flaws that are often exploited. The current lack of an attack surface and zero known CVEs are positive, but they mask significant inherent risks within the code itself. A balanced conclusion would be that the plugin has a solid foundation in terms of SQL handling and a clean history, but critical flaws in serialization and output escaping require immediate attention to prevent exploitation.
Key Concerns
- Dangerous function 'unserialize' without auth checks
- Dangerous function 'unserialize' without nonce checks
- Low percentage of properly escaped output (5%)
- No capability checks on potential entry points
- No nonce checks on potential entry points
mPandco Security Vulnerabilities
mPandco Code Analysis
Dangerous Functions Found
Output Escaping
mPandco Attack Surface
WordPress Hooks 5
Maintenance & Trust
mPandco Maintenance & Trust
Maintenance Signals
Community Trust
mPandco Alternatives
Pabilo Payment Gateway for WooCommerce
pabilo-payment-gateway-for-woocommerce
Accept mobile payments (Pago Móvil) and bank transfers from Venezuela (Banco de Venezuela, Mercantil, Banesco, Provincial) via Pabilo.
Payment Gateway Based Fees and Discounts for WooCommerce
checkout-fees-for-woocommerce
Set fees and discounts for WooCommerce payment gateways.
Paystack WooCommerce Payment Gateway
woo-paystack
Paystack for WooCommerce allows your WooCommerce store to accept secure payments from multiple local and global payment channels.
Montonio for WooCommerce
montonio-for-woocommerce
Montonio is a complete checkout solution for online stores that includes all popular payment methods (local banks, card payments, Apple Pay, Google Pa …
NETOPIA Payments Payment Gateway
netopia-payments-payment-gateway
NETOPIA Payments Payment Gateway extends WooCommerce payment options by adding NETOPIA's Payment Gateway options.
mPandco Developer Profile
1 plugin · 10 total installs
How We Detect mPandco
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/mpandco/assets/css/mpandco_checkout.css/wp-content/plugins/mpandco/assets/js/mpandco_checkout.js/wp-content/plugins/mpandco/assets/js/mpandco_checkout.jsmpandco/assets/css/mpandco_checkout.css?ver=mpandco/assets/js/mpandco_checkout.js?ver=HTML / DOM Fingerprints
mpandco_checkout_formdata-mpandco-api-urlmpandco_checkout_params