
myCred Square Security & Risk Analysis
wordpress.org/plugins/mycred-square📢🚨 Important Notice: myCred Square is now part of the myCred Toolkit and will no longer receive updates here. Only security fixes will be provided.
Is myCred Square Safe to Use in 2026?
Generally Safe
Score 92/100myCred Square has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The mycred-square plugin version 1.0.9 exhibits a generally good security posture with several strong practices in place. The complete absence of known vulnerabilities in its history is a significant positive indicator. Furthermore, the code demonstrates a commitment to secure SQL handling with 100% of queries using prepared statements and a very high percentage (98%) of properly escaped outputs, minimizing the risk of SQL injection and XSS vulnerabilities from these common vectors. The lack of file operations and bundled libraries also reduces potential attack surfaces.
However, there are clear areas of concern that warrant attention. The presence of two unprotected AJAX handlers significantly increases the attack surface, as these entry points are exposed to unauthorized users. While the taint analysis did not reveal any unsanitized flows, the lack of capability checks on these AJAX endpoints means that any logic executed within them is not protected against privilege escalation or unauthorized actions. The plugin also relies on nonce checks for its AJAX endpoints, which is a good practice, but their absence of capability checks on these handlers undermines this protection.
In conclusion, the plugin's strengths lie in its robust SQL and output handling, and its clean vulnerability history. The primary weakness is the unprotected AJAX handlers, which represent a notable risk. While there are no currently known vulnerabilities, the exposed AJAX endpoints could be exploited if malicious input or logic is introduced in future updates or if other security measures are bypassed. Addressing the unprotected AJAX handlers should be a priority to solidify the plugin's security.
Key Concerns
- AJAX handlers without authentication checks
- AJAX handlers without capability checks
myCred Square Security Vulnerabilities
myCred Square Release Timeline
myCred Square Code Analysis
Output Escaping
Data Flow Analysis
myCred Square Attack Surface
AJAX Handlers 2
Shortcodes 1
WordPress Hooks 13
Maintenance & Trust
myCred Square Maintenance & Trust
Maintenance Signals
Community Trust
myCred Square Alternatives
WPExperts Square For GiveWP
wpexperts-square-for-give
GiveWP Square plugin for WordPress allows users to donate from their give-donation form using Square payment gateway. Now, you can accept credit card …
elegro Crypto Payment
elegro-payment
Increase your customers base by accepting cryptocurrencies.
Montonio for WooCommerce
montonio-for-woocommerce
Montonio is a complete checkout solution for online stores that includes all popular payment methods (local banks, card payments, Apple Pay, Google Pa …
NETOPIA Payments Payment Gateway
netopia-payments-payment-gateway
NETOPIA Payments Payment Gateway extends WooCommerce payment options by adding NETOPIA's Payment Gateway options.
SumUp Payment Gateway For WooCommerce
sumup-payment-gateway-for-woocommerce
The SumUp plugin for WooCommerce allows businesses to securely process payments online. Accept payments from customers using a range of payment method …
myCred Square Developer Profile
89 plugins · 1.4M total installs
How We Detect myCred Square
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/mycred-square/assets/css/mycred-square.css/wp-content/plugins/mycred-square/assets/js/mycred-square.js/wp-content/plugins/mycred-square/assets/js/mycred-square.jsmycred-square/assets/css/mycred-square.css?ver=mycred-square/assets/js/mycred-square.js?ver=HTML / DOM Fingerprints
mycred-square-wrapperdata-mycred-square-settingsmycred_square_params