Pledged Plugins PCI Gateway for NMI and WooCommerce Security & Risk Analysis

wordpress.org/plugins/wp-nmi-gateway-pci-woocommerce

PCI Compliant NMI payment gateway integration for WooCommerce to accept credit cards directly on WordPress e-commerce websites.

3K active installs v1.2.11 PHP 5.6+ WP 4.4+ Updated Mar 17, 2026
network-merchantsnmipayment-gatewaypciwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Pledged Plugins PCI Gateway for NMI and WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

Pledged Plugins PCI Gateway for NMI and WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The 'wp-nmi-gateway-pci-woocommerce' plugin v1.2.10 exhibits a strong security posture in several key areas. Static analysis reveals no exploitable attack surface, with zero AJAX handlers, REST API routes, shortcodes, or cron events. The absence of dangerous functions and file operations is also a positive indicator. Furthermore, all SQL queries are properly prepared, and there are no recorded vulnerabilities or CVEs for this plugin, suggesting a history of responsible development and maintenance. The presence of an external HTTP request, however, warrants further investigation to ensure secure handling of any data transmitted externally.

The primary concern arises from the output escaping. With 60% of outputs properly escaped, there's a 40% chance of unsanitized data being rendered to the user. While taint analysis showed no issues, this percentage of unescaped output still presents a potential Cross-Site Scripting (XSS) vector if user-supplied data is directly included in these outputs. The lack of nonce checks and capability checks on potential entry points, though currently non-existent due to the limited attack surface, highlights areas that would need strict attention if the plugin's functionality were to expand.

Overall, the plugin is well-secured against common attack vectors due to its minimal attack surface and robust SQL handling. However, the imperfect output escaping is a weakness that could be exploited. The absence of vulnerabilities in its history is a good sign, but the observed code signals should be addressed to maintain this strong security record.

Key Concerns

  • 40% of outputs not properly escaped
  • One external HTTP request
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Pledged Plugins PCI Gateway for NMI and WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Pledged Plugins PCI Gateway for NMI and WooCommerce Release Timeline

v1.2.11Current
v1.2.10
v1.2.9
v1.2.8
v1.2.7
v1.2.6
v1.2.5
v1.2.4
v1.2.3
v1.2.2
v1.2.1
v1.2.0
v1.1.7
v1.1.6
v1.1.5
v1.1.4
v1.1.3
v1.1.2
v1.1.1
v1.1.0
Code Analysis
Analyzed Mar 16, 2026

Pledged Plugins PCI Gateway for NMI and WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

60% escaped15 total outputs
Attack Surface

Pledged Plugins PCI Gateway for NMI and WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 22
actionbefore_woocommerce_initgateway.php:63
actionadmin_initgateway.php:74
actionadmin_noticesgateway.php:75
actionplugins_loadedgateway.php:76
filterwoocommerce_payment_gatewaysgateway.php:114
actioninitgateway.php:141
actionwoocommerce_order_status_processinggateway.php:144
actionwoocommerce_order_status_completedgateway.php:145
actionwoocommerce_order_status_processinggateway.php:147
actionwoocommerce_order_status_completedgateway.php:148
actionwoocommerce_order_status_cancelledgateway.php:151
actionwoocommerce_order_status_refundedgateway.php:152
actionwoocommerce_blocks_loadedgateway.php:368
actionwoocommerce_blocks_payment_method_type_registrationgateway.php:377
actionwp_enqueue_scriptsincludes\class-wc-gateway-nmi.php:76
actionadmin_noticesincludes\class-wc-gateway-nmi.php:77
filterscript_loader_tagincludes\class-wc-gateway-nmi.php:416
filterhttp_request_timeoutincludes\class-wc-gateway-nmi.php:644
actionwoocommerce_rest_checkout_process_payment_with_contextincludes\class-wc-nmi-blocks-support.php:22
actionwc_gateway_nmi_process_payment_errorincludes\class-wc-nmi-blocks-support.php:236
actioninitincludes\class-wc-nmi-privacy.php:16
filterwoocommerce_get_settings_accountincludes\class-wc-nmi-privacy.php:17
Maintenance & Trust

Pledged Plugins PCI Gateway for NMI and WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 17, 2026
PHP min version5.6
Downloads68K

Community Trust

Rating100/100
Number of ratings4
Active installs3K
Developer Profile

Pledged Plugins PCI Gateway for NMI and WooCommerce Developer Profile

mohsin.id

6 plugins · 15K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Pledged Plugins PCI Gateway for NMI and WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-nmi-gateway-pci-woocommerce/assets/js/wc-nmi-gateway-nmi.js/wp-content/plugins/wp-nmi-gateway-pci-woocommerce/assets/css/wc-nmi-gateway-nmi.css
Script Paths
/wp-content/plugins/wp-nmi-gateway-pci-woocommerce/assets/js/wc-nmi-gateway-nmi.js
Version Parameters
wp-nmi-gateway-pci-woocommerce/assets/js/wc-nmi-gateway-nmi.js?ver=wp-nmi-gateway-pci-woocommerce/assets/css/wc-nmi-gateway-nmi.css?ver=

HTML / DOM Fingerprints

CSS Classes
nmi-payment-gateway
HTML Comments
<!-- NMI Payment Gateway Form --><!-- End NMI Payment Gateway Form -->
Data Attributes
data-nmi-form
JS Globals
wc_nmi_gateway_params
FAQ

Frequently Asked Questions about Pledged Plugins PCI Gateway for NMI and WooCommerce