Payment Gateway for ClicToPay on WooCommerce Security & Risk Analysis

wordpress.org/plugins/wc-clictopay-payment-gateway

ClicToPay Payment Gateway for WooCommerce (designed for stores in Tunisia)

20 active installs v1.0.2 PHP + WP + Updated Mar 24, 2022
clictopaypayment-gatewaywoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Payment Gateway for ClicToPay on WooCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

Payment Gateway for ClicToPay on WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "wc-clictopay-payment-gateway" plugin v1.0.2 exhibits a generally good security posture based on the provided static analysis. It demonstrates strong adherence to secure coding practices by utilizing prepared statements for all SQL queries and ensuring all output is properly escaped. The absence of dangerous functions, file operations, and the minimal attack surface (one shortcode) further contribute to its perceived security. Furthermore, the plugin has no recorded vulnerability history, indicating a lack of past exploitable issues.

However, there are a few areas that warrant attention. The presence of 3 taint flows with unsanitized paths, even without a critical or high severity classification, suggests potential for unexpected behavior or data leakage if user-supplied data is not handled meticulously. More concerning is the complete lack of nonce checks and capability checks across all entry points. This is a significant oversight, as it leaves the plugin vulnerable to CSRF attacks and unauthorized actions, especially if the shortcode or any other undocumented entry point can trigger sensitive operations. The two external HTTP requests also represent a potential avenue for attack if the target endpoints are compromised or if the plugin does not validate the responses adequately.

In conclusion, while the plugin scores well on fundamental secure coding principles like SQL preparation and output escaping, the absence of nonce and capability checks introduces a critical security weakness. The taint analysis, though not critical, highlights a need for careful input validation. The lack of a vulnerability history is positive but does not negate the identified weaknesses in access control.

Key Concerns

  • No nonce checks
  • No capability checks
  • Taint flows with unsanitized paths (3)
  • External HTTP requests (2)
Vulnerabilities
None known

Payment Gateway for ClicToPay on WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Payment Gateway for ClicToPay on WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
wc_ctp_init_credit_card_gateway_class (payment_gateway_for_clicToPay_on_WooCommerce.php:65)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Payment Gateway for ClicToPay on WooCommerce Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[clictopay_check_payment] payment_gateway_for_clicToPay_on_WooCommerce.php:240
WordPress Hooks 5
filterwoocommerce_payment_gatewayspayment_gateway_for_clicToPay_on_WooCommerce.php:54
actionplugins_loadedpayment_gateway_for_clicToPay_on_WooCommerce.php:64
actionwp_enqueue_scriptspayment_gateway_for_clicToPay_on_WooCommerce.php:105
actioninitpayment_gateway_for_clicToPay_on_WooCommerce.php:244
actionwp_footerpayment_gateway_for_clicToPay_on_WooCommerce.php:255
Maintenance & Trust

Payment Gateway for ClicToPay on WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedMar 24, 2022
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings3
Active installs20
Developer Profile

Payment Gateway for ClicToPay on WooCommerce Developer Profile

khlilturki97

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Payment Gateway for ClicToPay on WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wc-clictopay-payment-gateway/
Version Parameters
wc-clictopay-payment-gateway/includes/payment-gateway.js?ver=wc-clictopay-payment-gateway/assets/css/payment-gateway.css?ver=

HTML / DOM Fingerprints

JS Globals
window.clictopay_params
Shortcode Output
[clictopay_check_payment]
FAQ

Frequently Asked Questions about Payment Gateway for ClicToPay on WooCommerce