WC First Data Payment Gateway Security & Risk Analysis

wordpress.org/plugins/wc-first-data-payment-gateway

WC First Data Payment Gateway addon adds a payment option for customers to pay with their Credit Cards.

10 active installs v1.3 PHP + WP 4.5+ Updated Apr 21, 2017
credicard-payfirst-datafirst-data-gatewaypaymentpayment-gateway
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WC First Data Payment Gateway Safe to Use in 2026?

Generally Safe

Score 85/100

WC First Data Payment Gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The WC First Data Payment Gateway plugin v1.3 appears to have a generally strong security posture based on the provided static analysis. The absence of any entry points such as AJAX handlers, REST API routes, shortcodes, or cron events is a significant positive indicator, as it minimizes the attack surface. Furthermore, the code signals show a commitment to secure coding practices, with no dangerous functions, all SQL queries utilizing prepared statements, and a lack of file operations or external HTTP requests outside of a single, potentially manageable one. The absence of known vulnerabilities in its history is also reassuring. However, there are some areas for improvement. The output escaping is only 65% properly handled, which could lead to cross-site scripting (XSS) vulnerabilities if not carefully managed. The complete lack of nonce checks and capability checks across all analyzed components is a significant concern, as it implies that actions that should be protected are not adequately secured against unauthorized execution. This is particularly worrying given the absence of explicit authentication checks on entry points (though there are no entry points).

Key Concerns

  • Output escaping is only 65% proper
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

WC First Data Payment Gateway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WC First Data Payment Gateway Release Timeline

v1.0
Code Analysis
Analyzed Mar 17, 2026

WC First Data Payment Gateway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
11 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

65% escaped17 total outputs
Attack Surface

WC First Data Payment Gateway Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedwc-first-data-payment-gateway.php:12
actionadmin_noticeswc-first-data-payment-gateway.php:50
actionwoocommerce_update_options_payment_gatewayswc-first-data-payment-gateway.php:55
actionwoocommerce_receipt_first_datawc-first-data-payment-gateway.php:58
actionwoocommerce_credit_card_form_fieldswc-first-data-payment-gateway.php:59
filterwoocommerce_payment_gatewayswc-first-data-payment-gateway.php:384
Maintenance & Trust

WC First Data Payment Gateway Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.33
Last updatedApr 21, 2017
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WC First Data Payment Gateway Developer Profile

Virtina

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WC First Data Payment Gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wc-first-data-payment-gateway/images/first_data.png
Version Parameters
wc-first-data-payment-gateway/wc-first-data-payment-gateway.php?ver=vtwc_fistdata

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WC First Data Payment Gateway