Parsian Woocommerce Security & Risk Analysis

wordpress.org/plugins/parsian-woocommerce

درگاه پرداخت بانک پارسیان برای فروشگاه ساز ووکامرس

100 active installs v1.1 PHP + WP 4.6+ Updated Aug 31, 2018
commercee-commerceshopwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Parsian Woocommerce Safe to Use in 2026?

Generally Safe

Score 85/100

Parsian Woocommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The Parsian WooCommerce plugin version 1.1 exhibits a seemingly strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, indicating a minimal attack surface and a lack of common entry points for attackers. The code also demonstrates good practices by using prepared statements for all SQL queries and avoiding dangerous functions. Furthermore, the plugin has no recorded vulnerability history, suggesting a history of stable and secure development.

However, several areas raise significant concerns. The absence of any nonce checks or capability checks across the identified entry points is a critical oversight. This means that any actions that might be triggered by these (even though currently zero) would be entirely unprotected, leaving them vulnerable to unauthorized execution. The low percentage of properly escaped output (25%) is also a serious risk, as it suggests that user-supplied data could be rendered directly into the page without proper sanitization, potentially leading to Cross-Site Scripting (XSS) vulnerabilities. While no taint flows were identified in this specific analysis, the lack of input validation and output escaping creates fertile ground for such issues to emerge.

In conclusion, while the plugin's minimal attack surface and use of prepared statements are positive, the complete lack of authorization and sanitization checks on potential entry points, coupled with poor output escaping, presents a substantial security risk. The absence of historical vulnerabilities is a good sign, but it doesn't negate the critical weaknesses identified in the current code.

Key Concerns

  • No nonce checks
  • No capability checks
  • Low output escaping (25%)
Vulnerabilities
None known

Parsian Woocommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Parsian Woocommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
4
External Requests
1
Bundled Libraries
0

Output Escaping

25% escaped8 total outputs
Attack Surface

Parsian Woocommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterwoocommerce_payment_gatewaysclass-wc-gateway-parsian.php:10
filterwoocommerce_currenciesclass-wc-gateway-parsian.php:17
filterwoocommerce_currency_symbolclass-wc-gateway-parsian.php:28
actionwoocommerce_update_options_payment_gatewaysclass-wc-gateway-parsian.php:65
actionplugins_loadedclass-wc-gateway-parsian.php:364
Maintenance & Trust

Parsian Woocommerce Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedAug 31, 2018
PHP min version
Downloads8K

Community Trust

Rating60/100
Number of ratings2
Active installs100
Developer Profile

Parsian Woocommerce Developer Profile

barfaraz

4 plugins · 210 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Parsian Woocommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/parsian-woocommerce/assets/images/logo.png

HTML / DOM Fingerprints

CSS Classes
bankparsian-checkout-formbankparsian-payment-button
REST Endpoints
/wc-api/WC_Gateway_Bankparsian
FAQ

Frequently Asked Questions about Parsian Woocommerce