Payment Gateway Remise for WooCommerce Security & Risk Analysis

wordpress.org/plugins/wc-remise-gateway

This plugin adds the functionality to take Remise payments on your store of WooCommerce.

0 active installs v0.1.2 PHP 7.0+ WP 4.4+ Updated Apr 9, 2025
checkoutececommercepaymentswoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Payment Gateway Remise for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

Payment Gateway Remise for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12mo ago
Risk Assessment

The 'wc-remise-gateway' plugin, in version 0.1.2, exhibits a strong security posture in several key areas, particularly concerning its limited attack surface and the absence of known historical vulnerabilities. The static analysis reveals no direct entry points like AJAX handlers, REST API routes, or shortcodes that are exposed without authentication or proper checks. Furthermore, the plugin demonstrates good practices by using prepared statements exclusively for its SQL queries and a high percentage of properly escaped output, which mitigates common injection and cross-site scripting risks. The lack of file operations and external HTTP requests (beyond one, which is not detailed) also reduces potential attack vectors.

However, there are notable areas of concern. The presence of 4 'flows with unsanitized paths' in the taint analysis, while not classified as critical or high severity in this specific scan, warrants attention. These flows represent potential pathways where user-supplied data might not be adequately validated or cleaned before being used in sensitive operations, even if the immediate impact isn't severe in this version. The complete absence of nonce checks and capability checks across all potential (though currently zero) entry points is a significant weakness. This means that if new entry points are introduced or if existing ones were missed in the analysis, there would be no built-in protection against CSRF attacks or unauthorized actions by unprivileged users.

In conclusion, the plugin is strong in its foundational security practices regarding database interactions and output handling, and its vulnerability history is clean, suggesting diligent maintenance or a short history. However, the unaddressed unsanitized paths and the complete lack of authorization checks are critical gaps that could be exploited if the attack surface were to expand or if the taint analysis missed a more severe consequence. While the current version appears relatively safe due to a minimal attack surface, these weaknesses represent potential future risks.

Key Concerns

  • Unsanitized paths in taint analysis
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Payment Gateway Remise for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Payment Gateway Remise for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
24 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

80% escaped30 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
wc_remise_gateway_mode_admin_notices (wc-remise-gateway.php:32)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Payment Gateway Remise for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionbefore_woocommerce_initwc-remise-gateway.php:22
actionplugins_loadedwc-remise-gateway.php:36
filterwoocommerce_payment_gatewayswc-remise-gateway.php:37
actionadmin_noticeswc-remise-gateway.php:43
actionadmin_noticeswc-remise-gateway.php:49
actionwoocommerce_api_wc_remisewc-remise-gateway.php:80
filterwoocommerce_order_email_verification_requiredwc-remise-gateway.php:83
filterwoocommerce_order_received_verify_known_shopperswc-remise-gateway.php:86
filterwoocommerce_order_email_verification_requiredwc-remise-gateway.php:375
filterwoocommerce_order_received_verify_known_shopperswc-remise-gateway.php:378
Maintenance & Trust

Payment Gateway Remise for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedApr 9, 2025
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Payment Gateway Remise for WooCommerce Developer Profile

Hiroaki Miyashita

12 plugins · 43K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
223 days
View full developer profile
Detection Fingerprints

How We Detect Payment Gateway Remise for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wc-remise-gateway/assets/css/wc-remise-gateway.css/wp-content/plugins/wc-remise-gateway/assets/js/wc-remise-gateway.js
Script Paths
/wp-content/plugins/wc-remise-gateway/assets/js/wc-remise-gateway.js
Version Parameters
wc-remise-gateway/assets/css/wc-remise-gateway.css?ver=wc-remise-gateway/assets/js/wc-remise-gateway.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- In order to use Remise, you have to purchase the authentication key at the following site. -->
Data Attributes
data-field-shopcodata-field-hostiddata-field-modedata-field-authorizationdata-field-itemdata-field-status+2 more
JS Globals
wc_remise_gateway_ajax_object
REST Endpoints
/wp-json/wc-remise-gateway/v1/payment
FAQ

Frequently Asked Questions about Payment Gateway Remise for WooCommerce