Payment Gateways by User Roles for WooCommerce Security & Risk Analysis

wordpress.org/plugins/payment-gateways-by-user-roles-for-woocommerce

Set user roles to include/exclude for WooCommerce payment gateways to show up.

3K active installs v1.4.0 PHP 8.0+ WP 4.4+ Updated Dec 22, 2025
payment-gatewayrole-based-checkoutrole-based-gatewaysuser-rolewoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Payment Gateways by User Roles for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

Payment Gateways by User Roles for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

Based on the static analysis, this plugin appears to have a strong security posture regarding its direct attack surface. There are no detected AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces the potential for external exploitation. The absence of dangerous functions, the exclusive use of prepared statements for SQL queries, and no file operations or external HTTP requests are all positive indicators of secure coding practices.

However, a notable concern arises from the output escaping. With 100% of outputs not properly escaped, there is a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any data rendered to the user that originates from an untrusted source could be exploited. The lack of nonce and capability checks across the board, while mitigated by the limited attack surface, means that if new entry points were introduced in future versions without proper security, they would be immediately vulnerable. The plugin's clean vulnerability history is a positive sign, suggesting a commitment to security or a lack of historical exploitable flaws, but this should not overshadow the identified output escaping issue.

In conclusion, while the plugin exhibits strengths in minimizing its attack surface and handling database interactions securely, the unescaped output presents a clear and present danger. This critical oversight, combined with the general absence of authorization checks, means the plugin is not as secure as its limited attack surface might initially suggest. Addressing the XSS risk through proper output escaping is paramount.

Key Concerns

  • 100% of outputs not properly escaped
  • 0 nonce checks detected
  • 0 capability checks detected
Vulnerabilities
None known

Payment Gateways by User Roles for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Payment Gateways by User Roles for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Payment Gateways by User Roles for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
filterwoocommerce_available_payment_gatewaysincludes\class-alg-wc-payment-gateways-by-user-roles-core.php:30
filterwoocommerce_get_sections_alg_wc_payment_gateways_by_user_rolesincludes\settings\class-alg-wc-payment-gateways-by-user-roles-settings-section.php:35
actionadmin_noticesincludes\settings\class-alg-wc-settings-payment-gateways-by-user-roles.php:80
actionbefore_woocommerce_initpayment-gateways-by-user-roles-for-woocommerce.php:146
filterwoocommerce_get_settings_pagespayment-gateways-by-user-roles-for-woocommerce.php:150
actioninitpayment-gateways-by-user-roles-for-woocommerce.php:152
actionadmin_initpayment-gateways-by-user-roles-for-woocommerce.php:157
Maintenance & Trust

Payment Gateways by User Roles for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 22, 2025
PHP min version8.0
Downloads29K

Community Trust

Rating100/100
Number of ratings4
Active installs3K
Developer Profile

Payment Gateways by User Roles for WooCommerce Developer Profile

Dhruvin

4 plugins · 15K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Payment Gateways by User Roles for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/payment-gateways-by-user-roles-for-woocommerce/includes/settings/class-alg-wc-payment-gateways-by-user-roles-settings-general.php/wp-content/plugins/payment-gateways-by-user-roles-for-woocommerce/includes/settings/class-alg-wc-settings-payment-gateways-by-user-roles.php/wp-content/plugins/payment-gateways-by-user-roles-for-woocommerce/includes/class-alg-wc-payment-gateways-by-user-roles-core.php/wp-content/plugins/payment-gateways-by-user-roles-for-woocommerce/includes/pro/class-alg-wc-payment-gateways-by-user-roles-pro.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Payment Gateways by User Roles for WooCommerce