Trust Payments Gateway for WooCommerce (JavaScript Library) Security & Risk Analysis

wordpress.org/plugins/trust-payments-gateway-3ds2

The Trust Payments plugin offers a simple and easy to implement method for merchants to add e-payment capabilities to their WooCommerce online commerc …

200 active installs v1.3.8 PHP 7.4+ WP 5.2+ Updated Oct 16, 2025
apigatewaypaymenttrust-paymentswoocommerce
94
A · Safe
CVEs total3
Unpatched0
Last CVEJul 3, 2025
Download
Safety Verdict

Is Trust Payments Gateway for WooCommerce (JavaScript Library) Safe to Use in 2026?

Generally Safe

Score 94/100

Trust Payments Gateway for WooCommerce (JavaScript Library) has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

3 known CVEsLast CVE: Jul 3, 2025Updated 7mo ago
Risk Assessment

The 'trust-payments-gateway-3ds2' plugin v1.3.8 demonstrates a mixed security posture. On the positive side, it has a limited attack surface with all entry points protected by authentication checks. The plugin also utilizes prepared statements for all SQL queries and has a high percentage of properly escaped output, indicating good fundamental development practices. The absence of file operations and a reasonable number of external HTTP requests are also positive signs. However, the presence of the `unserialize` function is a significant concern, as it can lead to Remote Code Execution (RCE) if an attacker can control the serialized data. While no critical taint flows were found, five high-severity flows with unsanitized paths are a major red flag, suggesting potential vulnerabilities that could be exploited. The vulnerability history reveals a pattern of high and medium severity issues, predominantly Cross-Site Request Forgery (CSRF), with a recent high-severity vulnerability from 2025-07-03. Although currently unpatched CVEs are zero, the recurring nature of significant vulnerabilities suggests a need for more robust security testing and development processes. Overall, while some foundational security practices are in place, the presence of dangerous functions, high-severity unsanitized taint flows, and a history of impactful vulnerabilities necessitate careful consideration and remediation.

Key Concerns

  • High severity taint flows with unsanitized paths
  • Dangerous function: unserialize detected
  • High number of known vulnerabilities in history
  • Vulnerability history includes high severity issues
  • Vulnerability history includes medium severity issues
Vulnerabilities
3 published

Trust Payments Gateway for WooCommerce (JavaScript Library) Security Vulnerabilities

CVEs by Year

2 CVEs in 2022
2022
1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

High
2
Medium
1

3 total CVEs

CVE-2025-53569medium · 4.3Cross-Site Request Forgery (CSRF)

Trust Payments Gateway for WooCommerce (JavaScript Library) <= 1.3.6 - Cross-Site Request Forgery

Jul 3, 2025 Patched in 1.3.7 (6d)

Trust Payments Gateway (3DS2) <= 1.2.0 - Cross-Site Request Forgery

Jul 26, 2022 Patched in 1.2.1 (546d)

Trust Payments Gateway (3DS2) <= 1.2.2 - Cross-Site Request Forgery

Jul 26, 2022 Patched in 1.2.3 (546d)
Code Analysis
Analyzed Mar 16, 2026

Trust Payments Gateway for WooCommerce (JavaScript Library) Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
30 prepared
Unescaped Output
23
183 escaped
Nonce Checks
5
Capability Checks
0
File Operations
0
External Requests
5
Bundled Libraries
0

Dangerous Functions Found

unserialize$decode_cart_data = @unserialize( $cart_data[0]->session_value );classes\class-wc-tp-gateway.php:1570
unserialize$cart_total = @unserialize( $decode_cart_data['cart_totals'] );classes\class-wc-tp-gateway.php:1571
unserialize$customer_details = @unserialize( $decode_cart_data['customer'] );classes\class-wc-tp-gateway.php:1572

SQL Query Safety

100% prepared30 total queries

Output Escaping

89% escaped206 total outputs
Data Flows · Security
5 unsanitized

Data Flow Analysis

7 flows5 with unsanitized paths
tpgw_update_address_myst (trust-payments-gateway-3ds2.php:754)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Trust Payments Gateway for WooCommerce (JavaScript Library) Attack Surface

Entry Points8
Unprotected0

AJAX Handlers 8

authwp_ajax_tpgw_handle_paymenttrust-payments-gateway-3ds2.php:361
noprivwp_ajax_tpgw_handle_paymenttrust-payments-gateway-3ds2.php:362
authwp_ajax_tpgw_refund_purchasetrust-payments-gateway-3ds2.php:692
noprivwp_ajax_tpgw_refund_purchasetrust-payments-gateway-3ds2.php:693
authwp_ajax_tpgw_log_debugtrust-payments-gateway-3ds2.php:748
noprivwp_ajax_tpgw_log_debugtrust-payments-gateway-3ds2.php:749
authwp_ajax_tpgw_update_address_mysttrust-payments-gateway-3ds2.php:883
noprivwp_ajax_tpgw_update_address_mysttrust-payments-gateway-3ds2.php:884
WordPress Hooks 22
actionwoocommerce_admin_order_data_after_order_detailsclasses\class-wc-tp-gateway.php:245
actionwp_footerclasses\class-wc-tp-gateway.php:247
actionadmin_footerclasses\class-wc-tp-gateway.php:249
actionwoocommerce_account_edit-account_endpointclasses\class-wc-tp-gateway.php:251
actionadmin_footerclasses\class-wc-tp-gateway.php:253
actionwp_footerclasses\class-wc-tp-gateway.php:255
actionadmin_footerclasses\class-wc-tp-gateway.php:257
actionadmin_noticesclasses\class-wc-tp-gateway.php:259
actionadmin_noticesclasses\class-wc-tp-gateway.php:261
actionwoocommerce_admin_order_data_after_billing_addressclasses\class-wc-tp-gateway.php:263
actionwoocommerce_thankyouclasses\class-wc-tp-gateway.php:265
actionwp_footerclasses\class-wc-tp-gateway.php:272
actionwp_footerclasses\class-wc-tp-gateway.php:282
filterwoocommerce_payment_gatewaystrust-payments-gateway-3ds2.php:55
actionplugins_loadedtrust-payments-gateway-3ds2.php:84
actionwp_enqueue_scriptstrust-payments-gateway-3ds2.php:106
actioninittrust-payments-gateway-3ds2.php:568
filterwoocommerce_checkout_update_customer_datatrust-payments-gateway-3ds2.php:696
actioninittrust-payments-gateway-3ds2.php:911
actionadmin_footertrust-payments-gateway-3ds2.php:927
actioninittrust-payments-gateway-3ds2.php:1115
actiontemplate_redirecttrust-payments-gateway-3ds2.php:1314
Maintenance & Trust

Trust Payments Gateway for WooCommerce (JavaScript Library) Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedOct 16, 2025
PHP min version7.4
Downloads18K

Community Trust

Rating32/100
Number of ratings15
Active installs200
Developer Profile

Trust Payments Gateway for WooCommerce (JavaScript Library) Developer Profile

Trust Payments

2 plugins · 700 total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
299 days
View full developer profile
Detection Fingerprints

How We Detect Trust Payments Gateway for WooCommerce (JavaScript Library)

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/trust-payments-gateway-3ds2/assets/css/tp-gateway-checkout.css/wp-content/plugins/trust-payments-gateway-3ds2/assets/js/tp-gateway-checkout.js
Script Paths
https://cdn.eu.trustpayments.com/js/latest/st.js
Version Parameters
trust-payments-gateway-3ds2/assets/css/tp-gateway-checkout.css?ver=trust-payments-gateway-3ds2/assets/js/tp-gateway-checkout.js?ver=

HTML / DOM Fingerprints

CSS Classes
tp-gateway-checkout-form
Data Attributes
data-tp-noncedata-tp-transaction-data-url
JS Globals
tp_gateway_checkout_params
REST Endpoints
/wp-json/tp-gateway/v1/process-payment
FAQ

Frequently Asked Questions about Trust Payments Gateway for WooCommerce (JavaScript Library)