Paybox WooCommerce Payment Gateway Security & Risk Analysis

wordpress.org/plugins/paybox-woocommerce-gateway

This plugin is a Paybox payment gateway for WooCommerce 4.x

500 active installs v0.9.9.8 PHP + WP 5.0.0+ Updated Jan 20, 2026
e-commerceorderspaymentpayment-gatewaywoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Paybox WooCommerce Payment Gateway Safe to Use in 2026?

Generally Safe

Score 100/100

Paybox WooCommerce Payment Gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The plugin 'paybox-woocommerce-gateway' version 0.9.9.8 exhibits a mixed security posture. On the positive side, the plugin has no known past vulnerabilities, and the static analysis shows no critical or high severity taint flows, nor any raw SQL queries without prepared statements. The limited attack surface with zero AJAX handlers, REST API routes, shortcodes, or cron events, and no indications of untrusted input leading to unsanitized paths, are also positive signs. However, several concerning factors are present. The presence of four instances of the `unserialize` function without any apparent sanitization or capability checks is a significant risk. Furthermore, a substantial portion of output (65%) is not properly escaped, potentially leading to cross-site scripting (XSS) vulnerabilities. The complete absence of nonce checks and capability checks on entry points, while the attack surface is technically zero, leaves open the possibility of exploitation if entry points were to be added or discovered, and provides no defense against unauthorized actions.

While the plugin's historical record is clean, the current code analysis reveals significant potential weaknesses. The reliance on `unserialize` is a well-known vector for remote code execution if the serialized data can be controlled by an attacker. The lack of output escaping increases the risk of XSS attacks, which can lead to session hijacking or other malicious actions. The absence of nonce and capability checks, though not directly exploitable given the current zero attack surface, indicates a potential oversight in security best practices that could become problematic with future updates or integrations. In conclusion, the plugin has a clean history and some good practices regarding SQL and taint analysis, but the use of `unserialize` and the extensive lack of output escaping, coupled with missing nonce and capability checks, present considerable risks that require immediate attention.

Key Concerns

  • Unescaped output (65% not properly escaped)
  • Dangerous function: unserialize used without checks
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Paybox WooCommerce Payment Gateway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Paybox WooCommerce Payment Gateway Code Analysis

Dangerous Functions
4
Raw SQL Queries
0
3 prepared
Unescaped Output
13
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
6
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$data = unserialize($payment->data, ['allowed_classes' => false]);class\wc-paybox-standard-gateway.php:51
unserialize$data = unserialize($payment->data, ['allowed_classes' => false]);class\wc-paybox-threetime-gateway.php:59
unserialize$second = unserialize($payment->data, ['allowed_classes' => false]);class\wc-paybox-threetime-gateway.php:62
unserialize$third = unserialize($payment->data, ['allowed_classes' => false]);class\wc-paybox-threetime-gateway.php:66

SQL Query Safety

100% prepared3 total queries

Output Escaping

35% escaped20 total outputs
Attack Surface

Paybox WooCommerce Payment Gateway Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionwoocommerce_blocks_payment_method_type_registrationwoocommerce-paybox.php:107
actionplugins_loadedwoocommerce-paybox.php:118
actioninitwoocommerce-paybox.php:119
filterwoocommerce_payment_gatewayswoocommerce-paybox.php:120
actionwoocommerce_blocks_loadedwoocommerce-paybox.php:121
actionwoocommerce_admin_order_data_after_billing_addresswoocommerce-paybox.php:138
actionadmin_noticeswoocommerce-paybox.php:157
actionbefore_woocommerce_initwoocommerce-paybox.php:160
Maintenance & Trust

Paybox WooCommerce Payment Gateway Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 20, 2026
PHP min version
Downloads22K

Community Trust

Rating60/100
Number of ratings4
Active installs500
Developer Profile

Paybox WooCommerce Payment Gateway Developer Profile

Verifone e-commerce

3 plugins · 5K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Paybox WooCommerce Payment Gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/paybox-woocommerce-gateway/class/wc-paybox-abstract-gateway.php/wp-content/plugins/paybox-woocommerce-gateway/class/wc-paybox-config.php/wp-content/plugins/paybox-woocommerce-gateway/class/wc-paybox-encrypt.php/wp-content/plugins/paybox-woocommerce-gateway/class/wc-paybox-gateway-blocks-support.php/wp-content/plugins/paybox-woocommerce-gateway/class/wc-paybox-iso3166-country.php/wp-content/plugins/paybox-woocommerce-gateway/class/wc-paybox-iso4217currency.php/wp-content/plugins/paybox-woocommerce-gateway/class/wc-paybox-standard-gateway.php/wp-content/plugins/paybox-woocommerce-gateway/class/wc-paybox-threetime-gateway.php+1 more

HTML / DOM Fingerprints

CSS Classes
notice-error
FAQ

Frequently Asked Questions about Paybox WooCommerce Payment Gateway