Pagaris para Woocommerce Security & Risk Analysis

wordpress.org/plugins/pagaris-para-woocommerce

NOTA: ESTE PLUGIN NO DEBE SEGUIR USÁNDOSE. POR FAVOR CONTACTA A PAGARIS PARA MÁS INFORMACIÓN. La forma más fácil y económica de que tus clientes pagu …

10 active installs v1.1.6 PHP 7.1+ WP 3.9.2+ Updated Sep 30, 2020
gatewaypagarispagospasarelawoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Pagaris para Woocommerce Safe to Use in 2026?

Generally Safe

Score 85/100

Pagaris para Woocommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "pagaris-para-woocommerce" plugin v1.1.6 exhibits a generally strong security posture based on the provided static analysis. Notably, there are no identified entry points such as AJAX handlers, REST API routes, or shortcodes that are exposed without authentication checks, which is a significant positive. Furthermore, the code adheres to secure practices regarding SQL queries, exclusively using prepared statements, and there are no recorded vulnerabilities in its history. The absence of critical or high-severity taint flows and dangerous functions is also reassuring.

However, some areas warrant attention. The plugin's output escaping is only 33% properly implemented, indicating a potential risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is outputted without sufficient sanitization. The presence of file operations, while not inherently malicious, can be a vector for attacks if not handled securely. The lack of nonce checks and capability checks on any of its (currently zero) entry points is a potential concern that could become a risk if new entry points are added without these security measures. The bundling of Guzzle, a popular HTTP client library, also introduces a dependency that could theoretically be a vector for vulnerabilities if the bundled version is outdated or itself vulnerable, although no specific issues are highlighted here.

In conclusion, while the plugin has a clean slate regarding known vulnerabilities and a good foundation of secure coding practices, the incomplete output escaping is a notable weakness. The lack of authentication checks on entry points is currently mitigated by the absence of such points, but this is a latent risk. Overall, the plugin appears to be reasonably secure but would benefit from addressing the output escaping issues to further solidify its security.

Key Concerns

  • Output escaping only 33% properly implemented
  • Bundled library (Guzzle) could be outdated
  • No nonce checks on potential entry points
  • No capability checks on potential entry points
Vulnerabilities
None known

Pagaris para Woocommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Pagaris para Woocommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
1

Bundled Libraries

Guzzle

Output Escaping

33% escaped3 total outputs
Attack Surface

Pagaris para Woocommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filterwoocommerce_payment_gatewayspagaris-gateway.php:27
actionplugins_loadedpagaris-gateway.php:34
actionwoocommerce_api_wc_pagaris_gatewaypagaris-gateway.php:80
actionwoocommerce_api_pagaris_webhookspagaris-gateway.php:86
actionwoocommerce_api_pagaris_sandbox_webhookspagaris-gateway.php:90
actionwoocommerce_order_status_changedpagaris-gateway.php:96
Maintenance & Trust

Pagaris para Woocommerce Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedSep 30, 2020
PHP min version7.1
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Pagaris para Woocommerce Developer Profile

pagaris

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Pagaris para Woocommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pagaris-para-woocommerce/public/css/payment.css/wp-content/plugins/pagaris-para-woocommerce/public/js/payment.js
Script Paths
/wp-content/plugins/pagaris-para-woocommerce/public/js/payment.js
Version Parameters
pagaris-para-woocommerce/public/css/payment.css?ver=pagaris-para-woocommerce/public/js/payment.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-pagaris-id
REST Endpoints
/wp-json/wc-pagaris-gateway//wp-json/pagaris-webhooks//wp-json/pagaris-sandbox-webhooks/
FAQ

Frequently Asked Questions about Pagaris para Woocommerce