Pagalo – WooCommerce Payment Gateway Security & Risk Analysis

wordpress.org/plugins/wp-pagalocard-woocommerce

This plugin allows your store to make payments via Pagalo service.

10 active installs v2.1.1 PHP 5.2.4+ WP 3.8+ Updated Nov 4, 2024
guatemalapagalopagalo-cardpagalocardvisanet
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Pagalo – WooCommerce Payment Gateway Safe to Use in 2026?

Generally Safe

Score 92/100

Pagalo – WooCommerce Payment Gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin "wp-pagalocard-woocommerce" v2.1.1 exhibits a generally strong security posture based on the provided static analysis. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points significantly limits the attack surface. Furthermore, the code signals indicate a responsible development approach, with no dangerous functions identified, all SQL queries using prepared statements, and a high percentage of output escaping. The plugin also avoids file operations and external HTTP requests, further reducing potential vulnerabilities.

However, a few areas warrant attention. The presence of one external HTTP request, while not inherently problematic, introduces a potential vector for supply chain attacks or issues with the external service. The plugin also lacks nonce checks on its identified entry points, which is a common security practice for preventing Cross-Site Request Forgery (CSRF) attacks, especially if any of these entry points could lead to state-changing actions. While the capability check is present for one instance, a broader application might be beneficial depending on the plugin's functionality.

The vulnerability history shows a clean slate with zero known CVEs. This lack of past vulnerabilities is a positive indicator of either diligent past development or limited exposure, but it's important to remain vigilant as new vulnerabilities can emerge. In conclusion, the plugin demonstrates good security practices in critical areas like SQL injection prevention and output sanitization. The main areas for improvement are the implementation of nonce checks for its entry points and a review of the external HTTP request's security implications.

Key Concerns

  • External HTTP requests made
  • Nonce checks are missing
Vulnerabilities
None known

Pagalo – WooCommerce Payment Gateway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Pagalo – WooCommerce Payment Gateway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
39 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

78% escaped50 total outputs
Attack Surface

Pagalo – WooCommerce Payment Gateway Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 15
actionadmin_noticesadmin\helpers\class-wc-gateway-pagalo-cuotas.php:43
actionwoocommerce_after_checkout_formadmin\helpers\class-wc-gateway-pagalo-cuotas.php:44
actionplugins_loadedadmin\wp-actions.php:12
filterwoocommerce_payment_gatewaysadmin\wp-actions.php:26
actionplugins_loadedadmin\wp-actions.php:29
actionwp_enqueue_scriptsadmin\wp-actions.php:38
actionadmin_enqueue_scriptsadmin\wp-actions.php:47
actionadmin_noticesadmin\wp-actions.php:55
actionbefore_woocommerce_initadmin\wp-actions.php:66
filterwoocommerce_credit_card_form_fieldsadmin\wp-filters.php:36
filterwoocommerce_checkout_fieldsadmin\wp-filters.php:43
actionwoocommerce_admin_order_data_after_billing_addressadmin\wp-filters.php:67
actionplugins_loadedwp-pagalo-woocommerce.php:25
actionadmin_noticeswp-pagalo-woocommerce.php:49
actionbefore_woocommerce_initwp-pagalo-woocommerce.php:86
Maintenance & Trust

Pagalo – WooCommerce Payment Gateway Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 4, 2024
PHP min version5.2.4
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Pagalo – WooCommerce Payment Gateway Developer Profile

Edwin Xico (XicoOfficial)

6 plugins · 100 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Pagalo – WooCommerce Payment Gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-pagalo-woocommerce/dist/assets/js/app.min.js/wp-content/plugins/wp-pagalo-woocommerce/dist/assets/js/admin.min.js/wp-content/plugins/wp-pagalo-woocommerce/dist/node_modules/cleave.js/dist/cleave.min.js
Script Paths
dist/node_modules/cleave.js/dist/cleave.min.jsdist/assets/js/app.min.jsdist/assets/js/admin.min.js
Version Parameters
wp-pagalo-cuotas-woocommerce-admin-js

HTML / DOM Fingerprints

CSS Classes
notice-errornotice-info
HTML Comments
<!-- If this file is accessed directory, then abort. --><!-- require_once('admin/wp-functions.php'); --><!-- Add custom Scripts --><!-- enqueue admin scripts -->+4 more
Data Attributes
name="dl_p_cuotas_pagalo-card-name"name="dl_p_cuotas_pagalo-card-number"name="dl_p_cuotas_pagalo-card-expiry"name="dl_p_cuotas_pagalo-card-cvc"
FAQ

Frequently Asked Questions about Pagalo – WooCommerce Payment Gateway