Dynamic Payment Gateways for WooCommerce Security & Risk Analysis

wordpress.org/plugins/wc-dynamic-payment-gateways-tcs

Dynamic Payment Gateways for WooCommerce allows you to easily restrict payment options for your customers based on their billing country.

0 active installs v1.1.4 PHP 8.1+ WP 5.9+ Updated Nov 12, 2024
dynamicecommercepayment-gatewaypaymentswoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Dynamic Payment Gateways for WooCommerce Safe to Use in 2026?

Generally Safe

Score 92/100

Dynamic Payment Gateways for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "wc-dynamic-payment-gateways-tcs" plugin version 1.1.4 exhibits a generally strong security posture. The absence of any recorded CVEs or past vulnerabilities is a significant positive indicator, suggesting a history of secure development. The static analysis further reinforces this, revealing no direct attack surface through common entry points like AJAX handlers, REST API routes, shortcodes, or cron events. Crucially, the code shows good practices in handling sensitive operations, with 100% of SQL queries using prepared statements, indicating a lack of direct SQL injection risks. The majority of output (86%) is also properly escaped, mitigating cross-site scripting (XSS) vulnerabilities. However, the complete absence of nonce and capability checks across all identified entry points (even though the attack surface is zero) is a notable concern. While there are no immediate entry points to exploit, any future expansion or modification of the plugin that introduces new handlers without these checks would create significant vulnerabilities. The lack of any taint analysis results is also difficult to interpret definitively; it could mean no flows were found, or the analysis itself was limited.

Key Concerns

  • No nonce checks identified
  • No capability checks identified
Vulnerabilities
None known

Dynamic Payment Gateways for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Dynamic Payment Gateways for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

86% escaped7 total outputs
Attack Surface

Dynamic Payment Gateways for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_noticessrc\Activation.php:11
filterwoocommerce_get_settings_pagessrc\Plugin.php:16
actionadmin_enqueue_scriptssrc\Plugin.php:17
filterwoocommerce_available_payment_gatewayssrc\Plugin.php:18
filterwoocommerce_settings_tabs_arraysrc\Settings.php:22
actionplugins_loadedwc-dynamic-payment-gateways-tcs.php:48
actionbefore_woocommerce_initwc-dynamic-payment-gateways-tcs.php:55
Maintenance & Trust

Dynamic Payment Gateways for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedNov 12, 2024
PHP min version8.1
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Dynamic Payment Gateways for WooCommerce Developer Profile

Tailcode Studio

1 plugin · 0 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Dynamic Payment Gateways for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wc-dynamic-payment-gateways-tcs/assets/js/admin.min.js
Script Paths
/wp-content/plugins/wc-dynamic-payment-gateways-tcs/assets/js/admin.min.js
Version Parameters
/assets/js/admin.min.js?ver=1.1.0

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Dynamic Payment Gateways for WooCommerce