Gateway zibal for Woocommerce Security & Risk Analysis

wordpress.org/plugins/zibal-payment-gateway-for-woocommerce

با نصب این پلاگین می توانید از خدمات درگاه پرداخت واسط و مستقیم و یا اختصاصی زیبال برروی فروشگاه ساز ووکامرس استفاده کنید

6K active installs v1.9 PHP + WP 4.5+ Updated Aug 25, 2025
gatewaypaymentwoocommercezibal%d8%b2%db%8c%d8%a8%d8%a7%d9%84
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Gateway zibal for Woocommerce Safe to Use in 2026?

Generally Safe

Score 100/100

Gateway zibal for Woocommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7mo ago
Risk Assessment

The static analysis of 'zibal-payment-gateway-for-woocommerce' v1.9 indicates a generally good security posture. The plugin has a minimal attack surface with no discovered AJAX handlers, REST API routes, shortcodes, or cron events. Crucially, there are no entry points identified that are unprotected. The code demonstrates strong practices by exclusively using prepared statements for all SQL queries and performing file operations. However, there are areas that warrant attention. A significant portion of output (33%) is not properly escaped, which could lead to Cross-Site Scripting (XSS) vulnerabilities if malicious data is processed and displayed. Furthermore, the absence of nonce checks across the plugin is a notable weakness. While no taint analysis flows were identified as critical or high, and there is no recorded vulnerability history, the lack of nonce checks leaves the plugin susceptible to Cross-Site Request Forgery (CSRF) attacks on any functions that might be triggered without proper authentication or authorization. The plugin also makes external HTTP requests, which, without further context, could be a vector for sensitive data leakage or manipulation if not handled securely.

Key Concerns

  • Significant unescaped output detected
  • No nonce checks found
  • External HTTP requests made
Vulnerabilities
None known

Gateway zibal for Woocommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Gateway zibal for Woocommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
6 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

67% escaped9 total outputs
Attack Surface

Gateway zibal for Woocommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionwoocommerce_update_options_payment_gatewaysclass-wc-gateway-zibal.php:43
actionadmin_bar_menuclass-wc-gateway-zibal.php:47
actionadmin_noticesclass-wc-gateway-zibal.php:49
filterwoocommerce_payment_gatewaysindex.php:22
actionplugins_loadedindex.php:31
actionbefore_woocommerce_initindex.php:41
actionwoocommerce_blocks_loadedindex.php:42
actionwoocommerce_blocks_payment_method_type_registrationindex.php:53
Maintenance & Trust

Gateway zibal for Woocommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedAug 25, 2025
PHP min version
Downloads35K

Community Trust

Rating100/100
Number of ratings2
Active installs6K
Developer Profile

Gateway zibal for Woocommerce Developer Profile

Mohammad Zamanzadeh

5 plugins · 7K total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Gateway zibal for Woocommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/zibal-payment-gateway-for-woocommerce/assets/images/logo.png

HTML / DOM Fingerprints

CSS Classes
zibal-checkout-form
Data Attributes
id="zibal-payment-button"
FAQ

Frequently Asked Questions about Gateway zibal for Woocommerce