PoloPag – Pix Automático para eCommerce Security & Risk Analysis

wordpress.org/plugins/wc-polo-payments

Aceite pagamentos via Pix e receba instantaneamente no banco de sua preferência! Instalação e configuração simples para todos.

100 active installs v3.0.0 PHP 7.0+ WP 5.2+ Updated Dec 19, 2025
lojapagamentopaymentpixshop
98
A · Safe
CVEs total1
Unpatched0
Last CVEJul 28, 2025
Download
Safety Verdict

Is PoloPag – Pix Automático para eCommerce Safe to Use in 2026?

Generally Safe

Score 98/100

PoloPag – Pix Automático para eCommerce has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jul 28, 2025Updated 3mo ago
Risk Assessment

The "wc-polo-payments" v3.0.0 plugin exhibits a generally strong security posture based on the static analysis. The absence of dangerous functions, SQL injection vulnerabilities due to prepared statements, and complete output escaping are significant strengths. Furthermore, the zero unprotected entry points and the presence of a nonce check are positive indicators.

However, a critical concern arises from the plugin's vulnerability history. A previously disclosed "PHP Remote File Inclusion" vulnerability, even if currently patched, indicates a potential for severe security flaws if not diligently maintained. The presence of one historical high-severity vulnerability and the fact that the last known vulnerability was in the future (2025-07-28) suggests potential data integrity or reporting issues. The single file operation and two external HTTP requests, while not immediately critical, warrant careful review to ensure they are implemented securely and don't introduce unforeseen risks.

In conclusion, while the current version of the plugin demonstrates good secure coding practices in its static analysis, the past vulnerability, particularly the RFI type, necessitates ongoing vigilance. Developers should prioritize comprehensive security auditing and timely patching of any future vulnerabilities. The reported future vulnerability date is a significant anomaly that requires clarification and investigation.

Key Concerns

  • History of PHP Remote File Inclusion vulnerability
  • One historically unpatched high severity vulnerability
  • External HTTP requests present
  • File operations present
  • Last vulnerability reported in the future
Vulnerabilities
1

PoloPag – Pix Automático para eCommerce Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

CVE-2025-60189high · 8.1Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')

PoloPag – Pix Automático para Woocommerce <= 2.0.9 - Unauthenticated Local File Inclusion

Jul 28, 2025 Patched in 3.0.0 (163d)
Code Analysis
Analyzed Mar 16, 2026

PoloPag – Pix Automático para eCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
197 escaped
Nonce Checks
1
Capability Checks
0
File Operations
1
External Requests
2
Bundled Libraries
0

Output Escaping

100% escaped197 total outputs
Attack Surface

PoloPag – Pix Automático para eCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadd_meta_boxessrc\Admin\Order.php:16
actionwoocommerce_blocks_payment_method_type_registrationsrc\Core.php:279
actionwoocommerce_order_details_before_order_tablesrc\Gateway\PoloPixGateway.php:102
actionwoocommerce_email_before_order_tablesrc\Gateway\PoloPixGateway.php:103
filterwoocommerce_my_account_my_orders_actionssrc\Gateway\PoloPixGateway.php:105

Scheduled Events 2

polopagpayments_schedule
polopagpayments_schedule_api
Maintenance & Trust

PoloPag – Pix Automático para eCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 19, 2025
PHP min version7.0
Downloads2K

Community Trust

Rating80/100
Number of ratings4
Active installs100
Developer Profile

PoloPag – Pix Automático para eCommerce Developer Profile

PoloPag

1 plugin · 100 total installs

78
trust score
Avg Security Score
98/100
Avg Patch Time
163 days
View full developer profile
Detection Fingerprints

How We Detect PoloPag – Pix Automático para eCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wc-polo-payments/assets/js/public/checkout.js/wp-content/plugins/wc-polo-payments/assets/js/public/before-checkout.js
Script Paths
/wp-content/plugins/wc-polo-payments/assets/js/public/checkout.js/wp-content/plugins/wc-polo-payments/assets/js/public/before-checkout.js
Version Parameters
wc-polo-payments/assets/js/public/checkout.js?ver=wc-polo-payments/assets/js/public/before-checkout.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-polopagpayments-init
JS Globals
polopagpayments_geteway
FAQ

Frequently Asked Questions about PoloPag – Pix Automático para eCommerce