TranzCore Payments Security & Risk Analysis

wordpress.org/plugins/tranzcore-payments

In a few simple steps you can start accepting mobile money payments with TranzCore Payments on your WordPress site.

10 active installs v1.1 PHP 5.4+ WP 3.8+ Updated Unknown
instant-paymentpayment-gatewaypaymentstranzcoretranzcore-payments
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is TranzCore Payments Safe to Use in 2026?

Generally Safe

Score 100/100

TranzCore Payments has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'tranzcore-payments' plugin version 1.1 exhibits a generally positive security posture based on the provided static analysis. It boasts zero identified attack surface entry points that are unprotected, zero dangerous function usages, and all SQL queries are properly prepared. The absence of file operations and external HTTP requests (or at least, none flagged as such) is also a good sign. However, a notable concern is the low percentage (42%) of properly escaped output. This leaves the plugin susceptible to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not consistently handled with care, especially in the 58% of outputs that are not properly escaped. The plugin's vulnerability history is clean, with zero known CVEs, which suggests a history of good security practices or that it hasn't been a significant target. Despite the lack of known vulnerabilities, the unescaped output represents a tangible risk that needs to be addressed. In conclusion, while the plugin demonstrates several strong security foundations, the significant portion of unescaped output is a critical weakness that could be exploited. Proactive addressing of this issue is recommended.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

TranzCore Payments Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

TranzCore Payments Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

42% escaped12 total outputs
Attack Surface

TranzCore Payments Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionplugins_loadedtranzcore-payments.php:19
filterwoocommerce_payment_gatewaystranzcore-payments.php:274
Maintenance & Trust

TranzCore Payments Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedUnknown
PHP min version5.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

TranzCore Payments Developer Profile

George

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect TranzCore Payments

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
ppay_details
Data Attributes
id="tranzcoresubmit"name="process"id="submit_tranzcore_payment_form"
JS Globals
wc_enqueue_js
REST Endpoints
/wc-api/payment_tranzcore
FAQ

Frequently Asked Questions about TranzCore Payments