WC Authorize.net Payment Gateway Security & Risk Analysis

wordpress.org/plugins/wc-authorize-net-payment-gateway

WC Authorize.net Payment Gateway addon adds a payment option for customers to pay with their Credit Cards.

20 active installs v1.0 PHP + WP 4.5+ Updated Apr 21, 2017
authorize-netauthorize-net-gatewaycredicard-paypaymentpayment-gateway
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WC Authorize.net Payment Gateway Safe to Use in 2026?

Generally Safe

Score 85/100

WC Authorize.net Payment Gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The wc-authorize-net-payment-gateway plugin version 1.0 exhibits a generally strong security posture based on the provided static analysis. The absence of identified entry points like AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the code's adherence to using prepared statements for all SQL queries is commendable and a critical security practice.

However, there are a few areas that warrant attention. While no critical taint flows or dangerous functions were detected, the fact that only 71% of output is properly escaped indicates a potential for cross-site scripting (XSS) vulnerabilities in the remaining 29%. The presence of an external HTTP request, while not inherently a vulnerability, should be scrutinized to ensure it's handled securely and doesn't expose sensitive data or introduce injection risks. The complete lack of nonce checks and capability checks across all entry points (of which there are none) is a theoretical concern; if the attack surface were to grow in future versions without these safeguards, it could introduce significant risks.

Given the plugin's history of zero known CVEs and no recorded vulnerabilities, it suggests a diligent approach to security by its developers. This track record is a significant positive indicator. In conclusion, the plugin is likely secure for its current functionality and version, but the minor concerns around output escaping and the potential risk if the attack surface expands without additional security checks are worth noting for ongoing maintenance and future development.

Key Concerns

  • Unescaped output detected
  • External HTTP request present
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

WC Authorize.net Payment Gateway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WC Authorize.net Payment Gateway Release Timeline

v1.0Current
Code Analysis
Analyzed Mar 16, 2026

WC Authorize.net Payment Gateway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

71% escaped17 total outputs
Attack Surface

WC Authorize.net Payment Gateway Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedwc-authorizenet-aim-payment-gateway.php:13
actionadmin_noticeswc-authorizenet-aim-payment-gateway.php:48
actionwoocommerce_update_options_payment_gatewayswc-authorizenet-aim-payment-gateway.php:53
actionwoocommerce_receipt_first_datawc-authorizenet-aim-payment-gateway.php:56
actionwoocommerce_credit_card_form_fieldswc-authorizenet-aim-payment-gateway.php:57
filterwoocommerce_payment_gatewayswc-authorizenet-aim-payment-gateway.php:414
Maintenance & Trust

WC Authorize.net Payment Gateway Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.33
Last updatedApr 21, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

WC Authorize.net Payment Gateway Developer Profile

Virtina

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WC Authorize.net Payment Gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wc-authorize-net-payment-gateway/images/logo.gif

HTML / DOM Fingerprints

CSS Classes
woocommerce-checkoutpayment_boxerror
Data Attributes
data-placeholderdata-typedata-namedata-requireddata-paydata-payment-gateway
JS Globals
vtwc_authorize_aim_params
FAQ

Frequently Asked Questions about WC Authorize.net Payment Gateway