WPC Role-Based Payment Methods for WooCommerce Security & Risk Analysis

wordpress.org/plugins/wpc-role-based-payment-methods

WPC Role-Based Payment Methods enables the restriction of available payment gateways for each user role.

100 active installs v1.0.3 PHP + WP 4.0+ Updated Dec 11, 2025
paymentrole-basedwoocommercewpc
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPC Role-Based Payment Methods for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

WPC Role-Based Payment Methods for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The wpc-role-based-payment-methods plugin v1.0.3 exhibits a generally strong security posture based on the static analysis. The absence of any known CVEs, unpatched vulnerabilities, or common vulnerability types in its history is a significant positive indicator. The code also demonstrates good practices with 100% of SQL queries using prepared statements, a high percentage of properly escaped outputs, and the presence of nonce and capability checks on its entry points. There were no critical or high severity taint flows identified, and the attack surface, while consisting of 5 AJAX handlers, appears to be protected as there are no unprotected entry points.

However, the presence of three instances of the `unserialize` function is a notable concern. While there are no direct vulnerabilities indicated by the taint analysis in this specific version, `unserialize` is inherently risky if used with untrusted input. Any future vulnerability would likely stem from the mishandling of serialized data. The limited number of capability checks (2) compared to the number of AJAX handlers (5) could also represent a potential, albeit unproven, area of weakness if these checks are not comprehensive enough to cover all sensitive operations. Overall, the plugin is well-maintained and has a good track record, but the use of `unserialize` warrants careful monitoring and future audits.

Key Concerns

  • Presence of unserialize function
  • Limited capability checks compared to AJAX handlers
Vulnerabilities
None known

WPC Role-Based Payment Methods for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WPC Role-Based Payment Methods for WooCommerce Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
5
96 escaped
Nonce Checks
7
Capability Checks
2
File Operations
0
External Requests
3
Bundled Libraries
0

Dangerous Functions Found

unserialize$plugins = unserialize( $response['body'] );includes\dashboard\wpc-dashboard.php:111
unserialize$plugins = unserialize( $response['body'] );includes\dashboard\wpc-dashboard.php:189
unserialize$plugins = unserialize( $response['body'] );includes\kit\wpc-kit.php:98

Output Escaping

95% escaped101 total outputs
Data Flows
All sanitized

Data Flow Analysis

3 flows
ajax_export (includes\dashboard\wpc-dashboard.php:225)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WPC Role-Based Payment Methods for WooCommerce Attack Surface

Entry Points5
Unprotected0

AJAX Handlers 5

authwp_ajax_wpc_get_pluginsincludes\dashboard\wpc-dashboard.php:19
authwp_ajax_wpc_get_suggestionincludes\dashboard\wpc-dashboard.php:20
authwp_ajax_wpc_exportincludes\dashboard\wpc-dashboard.php:21
authwp_ajax_wpc_importincludes\dashboard\wpc-dashboard.php:22
authwp_ajax_wpc_get_essential_kitincludes\kit\wpc-kit.php:22
WordPress Hooks 14
actionadmin_enqueue_scriptsincludes\dashboard\wpc-dashboard.php:17
actionadmin_menuincludes\dashboard\wpc-dashboard.php:18
actionbefore_woocommerce_initincludes\hpos.php:7
actionadmin_enqueue_scriptsincludes\kit\wpc-kit.php:20
actionadmin_menuincludes\kit\wpc-kit.php:21
actionplugins_loadedwpc-role-based-payment-methods.php:37
actionadmin_noticeswpc-role-based-payment-methods.php:41
actioninitwpc-role-based-payment-methods.php:62
actionadmin_enqueue_scriptswpc-role-based-payment-methods.php:65
actionadmin_initwpc-role-based-payment-methods.php:66
actionadmin_menuwpc-role-based-payment-methods.php:67
filterplugin_action_linkswpc-role-based-payment-methods.php:70
filterplugin_row_metawpc-role-based-payment-methods.php:71
filterwoocommerce_available_payment_gatewayswpc-role-based-payment-methods.php:74
Maintenance & Trust

WPC Role-Based Payment Methods for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 11, 2025
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

WPC Role-Based Payment Methods for WooCommerce Developer Profile

WPClever

71 plugins · 441K total installs

87
trust score
Avg Security Score
99/100
Avg Patch Time
68 days
View full developer profile
Detection Fingerprints

How We Detect WPC Role-Based Payment Methods for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpc-role-based-payment-methods/assets/css/backend.css/wp-content/plugins/wpc-role-based-payment-methods/assets/js/backend.js
Script Paths
/wp-content/plugins/wpc-role-based-payment-methods/assets/js/backend.js
Version Parameters
wpc-role-based-payment-methods/assets/css/backend.css?ver=wpc-role-based-payment-methods/assets/js/backend.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpclever_settings_pagewpclever_settings_page_headerwpclever_settings_page_header_logowpclever_settings_page_header_textwpclever_settings_page_titlewpclever_settings_page_nav
Data Attributes
wpclever_settings_pagewpclever_settings_page_headerwpclever_settings_page_header_logowpclever_settings_page_header_textwpclever_settings_page_titlewpclever_settings_page_nav
FAQ

Frequently Asked Questions about WPC Role-Based Payment Methods for WooCommerce