MPower Woocommerce Payment Gateway Security & Risk Analysis

wordpress.org/plugins/mpower-woocommerce-payment-gateway

MPower Woocommerce Payment Gateway allows you to accept payment on your Woocommerce store, MPower Payments supports the following payment methods Mobi …

10 active installs v2.0.0 PHP + WP 3.0.1+ Updated Jan 15, 2016
fcb-speedbankmobile-walletpaymentpayment-gatewaywoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is MPower Woocommerce Payment Gateway Safe to Use in 2026?

Generally Safe

Score 85/100

MPower Woocommerce Payment Gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The plugin "mpower-woocommerce-payment-gateway" v2.0.0 presents a mixed security posture. On the positive side, the plugin demonstrates excellent practices by not utilizing dangerous functions, employing prepared statements exclusively for SQL queries, and having no recorded vulnerabilities (CVEs) or taint flows. The absence of external HTTP requests in the static analysis is also a good indicator of potentially reduced attack surface. However, significant concerns arise from the complete lack of output escaping and the absence of any capability checks or nonce verification. This suggests that data displayed to users might be susceptible to cross-site scripting (XSS) attacks, and critical operations could potentially be performed by unauthenticated or unauthorized users if any of the entry points were to be discovered or introduced in future versions. The static analysis indicates a zero attack surface currently, but this can be misleading if the plugin has limited functionality or if the analysis missed potential entry points. The lack of capability checks on potential entry points (even if none are explicitly identified) is a general security weakness.

Given the current analysis, the plugin appears to be in a relatively safe state due to the lack of identified vulnerabilities and secure SQL practices. However, the critical finding of 0% output escaping and 0 capability checks represents a significant potential risk that needs immediate attention. While there are no known vulnerabilities, the code itself contains weaknesses that could be exploited if an attacker discovers a way to trigger the unescaped output or bypass authentication mechanisms (which are not enforced by capability checks in this version). The absence of these fundamental security checks, despite a clean vulnerability history, points to a need for improved code hardening and defensive programming practices.

Key Concerns

  • 0% output escaping
  • 0 capability checks on entry points
  • 0 nonce checks on entry points
Vulnerabilities
None known

MPower Woocommerce Payment Gateway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

MPower Woocommerce Payment Gateway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

MPower Woocommerce Payment Gateway Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedmpowerpayment-woocommere-gateway.php:19
actionwoocommerce_update_options_payment_gatewaysmpowerpayment-woocommere-gateway.php:92
filterwoocommerce_currenciesmpowerpayment-woocommere-gateway.php:452
filterwoocommerce_currency_symbolmpowerpayment-woocommere-gateway.php:453
filterwoocommerce_payment_gatewaysmpowerpayment-woocommere-gateway.php:456
Maintenance & Trust

MPower Woocommerce Payment Gateway Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedJan 15, 2016
PHP min version
Downloads4K

Community Trust

Rating74/100
Number of ratings3
Active installs10
Developer Profile

MPower Woocommerce Payment Gateway Developer Profile

Akin Delu

3 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MPower Woocommerce Payment Gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mpower-woocommerce-payment-gateway/assets/images/logo.png

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about MPower Woocommerce Payment Gateway