PayJustNow for WooCommerce Security & Risk Analysis

wordpress.org/plugins/payjustnow-for-woocommerce

Buy now, pay later, interest-free! PayJustNow splits your purchase into 3 easy, zero-interest instalments in South Africa.

900 active installs v2.7.8 PHP 7.4+ WP 5.6+ Updated Feb 18, 2026
payjustnowsouth-african-payment-gatewaywoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PayJustNow for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

PayJustNow for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "payjustnow-for-woocommerce" plugin version 2.7.8 exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, the exclusive use of prepared statements for SQL queries, and a high percentage of properly escaped output are commendable practices. Furthermore, the plugin has no recorded vulnerabilities, which suggests a history of secure development and maintenance. The limited attack surface, with only one shortcode and no unprotected entry points identified, also contributes positively to its security. The lack of observed taint flows with unsanitized paths further reinforces the impression of a robustly coded plugin.

However, there are a few areas for consideration. The presence of two external HTTP requests, while not inherently a vulnerability, warrants scrutiny to ensure these requests are made securely and do not expose sensitive data or rely on vulnerable external services. A significant concern is the complete absence of nonce checks and capability checks. This is a critical oversight as it leaves the plugin vulnerable to CSRF (Cross-Site Request Forgery) attacks, especially if any actions performed by the shortcode or other components can be triggered by an attacker. While the current analysis shows no unprotected AJAX or REST API routes, the general lack of these fundamental security mechanisms is a weakness that could be exploited if the attack surface were to expand or if specific functionalities are present but not explicitly listed as entry points.

In conclusion, while the plugin demonstrates good practices in areas like SQL sanitization and output escaping, the complete omission of nonce and capability checks presents a significant security risk. The limited attack surface and clean vulnerability history are strengths, but they do not negate the potential impact of CSRF vulnerabilities. Addressing the lack of these crucial security checks should be a priority.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • External HTTP requests present
Vulnerabilities
None known

PayJustNow for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

PayJustNow for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
69 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

96% escaped72 total outputs
Attack Surface

PayJustNow for WooCommerce Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[payjustnow_single_product] woocommerce-gateway-payjustnow.php:417
WordPress Hooks 11
actionwoocommerce_api_wc_gateway_payjustnowclasses\payjustnow.class.php:86
actionwp_enqueue_scriptsclasses\payjustnow.class.php:90
actionbefore_woocommerce_initwoocommerce-gateway-payjustnow.php:47
actionwoocommerce_blocks_loadedwoocommerce-gateway-payjustnow.php:53
actionwoocommerce_blocks_payment_method_type_registrationwoocommerce-gateway-payjustnow.php:65
actionplugins_loadedwoocommerce-gateway-payjustnow.php:77
filterwoocommerce_payment_gatewayswoocommerce-gateway-payjustnow.php:85
filterwoocommerce_available_payment_gatewayswoocommerce-gateway-payjustnow.php:95
actionwoocommerce_after_cart_totalswoocommerce-gateway-payjustnow.php:393
actionwoocommerce_single_product_summarywoocommerce-gateway-payjustnow.php:398
actionwp_enqueue_scriptswoocommerce-gateway-payjustnow.php:414
Maintenance & Trust

PayJustNow for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 18, 2026
PHP min version7.4
Downloads12K

Community Trust

Rating100/100
Number of ratings1
Active installs900
Developer Profile

PayJustNow for WooCommerce Developer Profile

pjnplugin

1 plugin · 900 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PayJustNow for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/payjustnow-for-woocommerce/assets/images/PayJustNowLogoDarkTheme.png/wp-content/plugins/payjustnow-for-woocommerce/assets/images/PayJustNowLogoGreen.png/wp-content/plugins/payjustnow-for-woocommerce/assets/images/PayJustNowLogo.png/wp-content/plugins/payjustnow-for-woocommerce/assets/images/pjnstep1.png/wp-content/plugins/payjustnow-for-woocommerce/assets/images/pjnstep2.png/wp-content/plugins/payjustnow-for-woocommerce/assets/images/pjnstep3.png/wp-content/plugins/payjustnow-for-woocommerce/assets/images/pjnstep4.png/wp-content/plugins/payjustnow-for-woocommerce/assets/images/pjnarrow.png
Script Paths
/wp-content/plugins/payjustnow-for-woocommerce/assets/js/pjn-frontend.js
Version Parameters
payjustnow-for-woocommerce/assets/js/pjn-frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
pjnsinglepagetextpjnsinglepagetextzeropjnsinglepagetextpjnpjnsinglepagelogopjnsinglepricepjnsingleimgdivpjnsingletextdivpjnsingleimg+19 more
Data Attributes
data-pjn-api-keydata-pjn-signaturedata-pjn-amountdata-pjn-merchant-referencedata-pjn-customer-emaildata-pjn-customer-phone+2 more
JS Globals
pjn_payjustnow_paypayjustnow_paypjn_variable_product_update
REST Endpoints
/wp-json/payjustnow/v1/payment
FAQ

Frequently Asked Questions about PayJustNow for WooCommerce