Pagou – Payments for WooCommerce Security & Risk Analysis

wordpress.org/plugins/pagou-payments-for-woocommerce

Pagamentos via PIX e boletos bancários no WooCommerce.

30 active installs v1.1.2 PHP 7.4+ WP 6.6+ Updated Feb 18, 2025
boletopagamentospagoupixwoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Pagou – Payments for WooCommerce Safe to Use in 2026?

Generally Safe

Score 92/100

Pagou – Payments for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The static analysis of the "pagou-payments-for-woocommerce" v1.1.2 plugin reveals a generally strong security posture with no immediate critical vulnerabilities identified in the provided data. The absence of any recorded CVEs, unpatched vulnerabilities, or taint flows with unsanitized paths is a significant positive indicator. Furthermore, the plugin demonstrates good practices by utilizing prepared statements for all SQL queries. However, there are areas for improvement that introduce potential risks.

A notable concern is the complete lack of nonce checks and capability checks across all identified entry points, despite the presence of file operations and external HTTP requests. This absence creates a significant attack surface for potential Cross-Site Request Forgery (CSRF) and privilege escalation attacks, especially if these entry points are implicitly or explicitly exposed to user interaction without proper authorization. While the overall output escaping is decent at 69%, a portion remains unescaped, which could lead to Cross-Site Scripting (XSS) vulnerabilities if user-controlled data is present in these outputs.

In conclusion, while the plugin has a clean vulnerability history and sound SQL practices, the lack of robust authentication and authorization mechanisms on its entry points represents a considerable security weakness. Addressing the missing nonce and capability checks should be a priority to mitigate CSRF and unauthorized access risks. The unescaped output, though not a critical flaw based on the data, also warrants attention to prevent potential XSS.

Key Concerns

  • No nonce checks present
  • No capability checks present
  • Some output not properly escaped
Vulnerabilities
None known

Pagou – Payments for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Pagou – Payments for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
18
40 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
5
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

69% escaped58 total outputs
Attack Surface

Pagou – Payments for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 18
actionwoocommerce_rest_checkout_process_payment_with_contextincludes\class\blocks_support_boleto.php:22
actionwoocommerce_rest_checkout_process_payment_with_contextincludes\class\blocks_support_pix.php:22
actionwoocommerce_view_orderincludes\class\pagou_boleto.php:37
actionwoocommerce_view_orderincludes\class\pagou_pix.php:37
actionwoocommerce_order_refundedincludes\class\pagou_pix.php:40
filterwoocommerce_order_actionsincludes\class\pagou_pix.php:41
actionplugins_loadedincludes\class\start.php:12
actionwp_enqueue_scriptsincludes\class\start.php:13
filterwoocommerce_checkout_fieldsincludes\class\start.php:14
filterwoocommerce_payment_gatewaysincludes\class\start.php:20
actionwoocommerce_blocks_loadedincludes\class\start.php:21
actionwoocommerce_blocks_payment_method_type_registrationincludes\class\start.php:49
actionwoocommerce_api_acppfw_pixincludes\functions.php:5
actionwoocommerce_api_acppfw_boletoincludes\functions.php:66
actionbefore_woocommerce_initincludes\functions.php:139
actionwoocommerce_admin_order_data_after_order_detailsincludes\functions.php:140
actionplugins_loadedpagou-payments-for-woocommerce.php:26
actionadmin_noticespagou-payments-for-woocommerce.php:28
Maintenance & Trust

Pagou – Payments for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedFeb 18, 2025
PHP min version7.4
Downloads65K

Community Trust

Rating100/100
Number of ratings4
Active installs30
Developer Profile

Pagou – Payments for WooCommerce Developer Profile

pagoupagamentos

1 plugin · 30 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Pagou – Payments for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pagou-payments-for-woocommerce/assets/js/frontend/pagou_pix.js/wp-content/plugins/pagou-payments-for-woocommerce/assets/js/frontend/pagou_boleto.js/wp-content/plugins/pagou-payments-for-woocommerce/assets/css/frontend/pagou_pix.css/wp-content/plugins/pagou-payments-for-woocommerce/assets/css/frontend/pagou_boleto.css
Version Parameters
pagou-payments-for-woocommerce/assets/js/frontend/pagou_pix.js?ver=pagou-payments-for-woocommerce/assets/js/frontend/pagou_boleto.js?ver=pagou-payments-for-woocommerce/assets/css/frontend/pagou_pix.css?ver=pagou-payments-for-woocommerce/assets/css/frontend/pagou_boleto.css?ver=

HTML / DOM Fingerprints

CSS Classes
pagou-pix-payment-sectionpagou-pix-qrcode-containerpagou-boleto-payment-sectionpagou-boleto-barcode-container
HTML Comments
<!-- DEVELOPED BY --><!-- DEVELOPED BY -->
Data Attributes
data-pagou-pix-endpointdata-pagou-boleto-endpoint
JS Globals
window.pagouPixConfigwindow.pagouBoletoConfig
REST Endpoints
/wp-json/pagou-payments-for-woocommerce/v1/pix-payment/wp-json/pagou-payments-for-woocommerce/v1/boleto-payment
FAQ

Frequently Asked Questions about Pagou – Payments for WooCommerce