
Payment Gateway for ClicToPay on WooCommerce Security & Risk Analysis
wordpress.org/plugins/wc-clictopay-payment-gatewayClicToPay Payment Gateway for WooCommerce (designed for stores in Tunisia)
Is Payment Gateway for ClicToPay on WooCommerce Safe to Use in 2026?
Generally Safe
Score 85/100Payment Gateway for ClicToPay on WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wc-clictopay-payment-gateway" plugin v1.0.2 exhibits a generally good security posture based on the provided static analysis. It demonstrates strong adherence to secure coding practices by utilizing prepared statements for all SQL queries and ensuring all output is properly escaped. The absence of dangerous functions, file operations, and the minimal attack surface (one shortcode) further contribute to its perceived security. Furthermore, the plugin has no recorded vulnerability history, indicating a lack of past exploitable issues.
However, there are a few areas that warrant attention. The presence of 3 taint flows with unsanitized paths, even without a critical or high severity classification, suggests potential for unexpected behavior or data leakage if user-supplied data is not handled meticulously. More concerning is the complete lack of nonce checks and capability checks across all entry points. This is a significant oversight, as it leaves the plugin vulnerable to CSRF attacks and unauthorized actions, especially if the shortcode or any other undocumented entry point can trigger sensitive operations. The two external HTTP requests also represent a potential avenue for attack if the target endpoints are compromised or if the plugin does not validate the responses adequately.
In conclusion, while the plugin scores well on fundamental secure coding principles like SQL preparation and output escaping, the absence of nonce and capability checks introduces a critical security weakness. The taint analysis, though not critical, highlights a need for careful input validation. The lack of a vulnerability history is positive but does not negate the identified weaknesses in access control.
Key Concerns
- No nonce checks
- No capability checks
- Taint flows with unsanitized paths (3)
- External HTTP requests (2)
Payment Gateway for ClicToPay on WooCommerce Security Vulnerabilities
Payment Gateway for ClicToPay on WooCommerce Code Analysis
Data Flow Analysis
Payment Gateway for ClicToPay on WooCommerce Attack Surface
Shortcodes 1
WordPress Hooks 5
Maintenance & Trust
Payment Gateway for ClicToPay on WooCommerce Maintenance & Trust
Maintenance Signals
Community Trust
Payment Gateway for ClicToPay on WooCommerce Alternatives
ClicToPay for WooCommerce
clictopay-for-woocommerce
This plugin allows you to accept online payments by SPS Clictopay SMT in WooComerce.
Paystack WooCommerce Payment Gateway
woo-paystack
Paystack for WooCommerce allows your WooCommerce store to accept secure payments from multiple local and global payment channels.
Montonio for WooCommerce
montonio-for-woocommerce
Montonio is a complete checkout solution for online stores that includes all popular payment methods (local banks, card payments, Apple Pay, Google Pa …
NETOPIA Payments Payment Gateway
netopia-payments-payment-gateway
NETOPIA Payments Payment Gateway extends WooCommerce payment options by adding NETOPIA's Payment Gateway options.
SumUp Payment Gateway For WooCommerce
sumup-payment-gateway-for-woocommerce
The SumUp plugin for WooCommerce allows businesses to securely process payments online. Accept payments from customers using a range of payment method …
Payment Gateway for ClicToPay on WooCommerce Developer Profile
1 plugin · 20 total installs
How We Detect Payment Gateway for ClicToPay on WooCommerce
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wc-clictopay-payment-gateway/wc-clictopay-payment-gateway/includes/payment-gateway.js?ver=wc-clictopay-payment-gateway/assets/css/payment-gateway.css?ver=HTML / DOM Fingerprints
window.clictopay_params[clictopay_check_payment]