Módulo PagSeguro Security & Risk Analysis

wordpress.org/plugins/woo-pagseguro-rm

Adiciona PagSeguro aos meios de pagamento WooCommerce com taxas especiais de parceiro (ex: 3,15% no crédito).

1K active installs v3.16.7 PHP + WP 4.0+ Updated Aug 1, 2024
pagamentopagbankpagseguropayment
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Módulo PagSeguro Safe to Use in 2026?

Generally Safe

Score 92/100

Módulo PagSeguro has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin 'woo-pagseguro-rm' v3.16.7 exhibits a generally strong security posture based on the provided static analysis. It demonstrates excellent practices in its handling of SQL queries, exclusively using prepared statements, and a high percentage of properly escaped output, minimizing the risk of common injection and cross-site scripting vulnerabilities. The absence of any recorded historical vulnerabilities (CVEs) further suggests a well-maintained and secure codebase. The limited attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events without proper authentication or permission checks is a significant strength.

However, the presence of two instances of the `unserialize` function is a notable concern. While the static analysis does not indicate any taint flows stemming from these functions, `unserialize` is inherently dangerous if used with untrusted data, as it can lead to Remote Code Execution or other severe vulnerabilities. The lack of any recorded nonce checks, while not directly flagged as a risk in this specific analysis due to the zero attack surface, could become a vulnerability if new entry points are introduced without corresponding security checks. The plugin also makes four external HTTP requests, which, while not explicitly flagged as risky here, could be a vector for vulnerabilities if the external endpoints are compromised or if the data sent/received is not properly handled.

In conclusion, the plugin is largely secure with good practices in place. The primary area of caution revolves around the use of `unserialize` without clear indication of how the input is validated. The absence of historical vulnerabilities is a positive sign, but developers should remain vigilant, especially regarding the use of potentially dangerous functions and the secure handling of external requests. The lack of obvious vulnerabilities in this specific analysis should not lead to complacency.

Key Concerns

  • Dangerous function 'unserialize' used
  • 0 Nonce checks found
Vulnerabilities
None known

Módulo PagSeguro Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Módulo PagSeguro Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
8
82 escaped
Nonce Checks
0
Capability Checks
4
File Operations
0
External Requests
4
Bundled Libraries
0

Dangerous Functions Found

unserialize$responseBody = unserialize($responseBody);includes\class-wc-pagseguro-gateway.php:492
unserialize$responseBody = unserialize($responseBody);includes\class-wc-pagseguro-gateway.php:521

Output Escaping

91% escaped90 total outputs
Attack Surface

Módulo PagSeguro Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionwoocommerce_api_wc_pagseguro_gatewayincludes\class-wc-pagseguro-gateway.php:88
actionwoocommerce_api_wc_pagseguro_infoincludes\class-wc-pagseguro-gateway.php:89
actionvalid_pagseguro_ipn_requestincludes\class-wc-pagseguro-gateway.php:90
actionwoocommerce_email_after_order_tableincludes\class-wc-pagseguro-gateway.php:97
actionwp_enqueue_scriptsincludes\class-wc-pagseguro-gateway.php:98
actioninitincludes\class-wc-pagseguro.php:18
filterwoocommerce_payment_gatewaysincludes\class-wc-pagseguro.php:24
filterwoocommerce_available_payment_gatewaysincludes\class-wc-pagseguro.php:25
filterwoocommerce_billing_fieldsincludes\class-wc-pagseguro.php:26
filterwoocommerce_shipping_fieldsincludes\class-wc-pagseguro.php:27
actionadmin_noticesincludes\class-wc-pagseguro.php:31
actionadmin_noticesincludes\class-wc-pagseguro.php:34
actionplugins_loadedwoo-pagseguro-rm.php:43
Maintenance & Trust

Módulo PagSeguro Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedAug 1, 2024
PHP min version
Downloads70K

Community Trust

Rating96/100
Number of ratings32
Active installs1K
Developer Profile

Módulo PagSeguro Developer Profile

Ricardo Martins (PagBank Integrações)

2 plugins · 5K total installs

97
trust score
Avg Security Score
96/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect Módulo PagSeguro

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/woo-pagseguro-rm/assets/css/frontend/transparent-checkout.css/wp-content/plugins/woo-pagseguro-rm/assets/css/frontend/transparent-checkout.min.css
Script Paths
/wp-content/plugins/woo-pagseguro-rm/assets/js/frontend/transparent-checkout.js/wp-content/plugins/woo-pagseguro-rm/assets/js/frontend/transparent-checkout.min.js
Version Parameters
woo-pagseguro-rm/assets/css/frontend/transparent-checkout.css?ver=woo-pagseguro-rm/assets/js/frontend/transparent-checkout.js?ver=

HTML / DOM Fingerprints

CSS Classes
pagseguro-transparent-checkout
Data Attributes
data-pagseguro-transparent-checkout
JS Globals
PagSeguroDirectPayment
REST Endpoints
/wp-json/woo-pagseguro-rm/v1/create-payment
FAQ

Frequently Asked Questions about Módulo PagSeguro