Acta — Pay Per Article Security & Risk Analysis

wordpress.org/plugins/acta-pay-per-article

A pay-per-post solution for WordPress publishers. Give casual visitors a simple way to pay for content, no subscription required.

0 active installs v4.0.0 PHP 7.4+ WP 5.8+ Updated Mar 22, 2026
micropaymentsmonetizationpaid-contentpay-per-articlepaywall
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Acta — Pay Per Article Safe to Use in 2026?

Generally Safe

Score 100/100

Acta — Pay Per Article has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The 'acta-pay-per-article' v4.0.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, unsanitized taint flows, raw SQL queries, file operations, and a complete lack of known vulnerabilities are significant strengths. Furthermore, the plugin demonstrates good development practices by ensuring all outputs are properly escaped and utilizing prepared statements for any SQL interactions.

However, there are a few areas that warrant attention. While the attack surface is small and all entry points appear to have authentication checks, the presence of one REST API route without explicit permission callbacks is a potential concern. Additionally, the plugin makes four external HTTP requests, which can sometimes introduce risks if not handled securely or if the external endpoints are compromised. The plugin also implements three nonce checks and one capability check, which are positive security measures, but the limited number of these checks in conjunction with the external requests could be a point of review.

Overall, 'acta-pay-per-article' v4.0.0 appears to be a relatively secure plugin with no known historical vulnerabilities. The developers have followed many best practices. The primary areas for potential improvement would be to explicitly define permission callbacks for the REST API route and ensure the security of all external HTTP requests. The lack of historical vulnerabilities suggests a consistent commitment to security, but vigilance is always recommended, especially with external dependencies.

Key Concerns

  • REST API route without permission callback
  • External HTTP requests (4)
Vulnerabilities
None known

Acta — Pay Per Article Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Acta — Pay Per Article Release Timeline

v4.0.0Current
Code Analysis
Analyzed Apr 16, 2026

Acta — Pay Per Article Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
40 escaped
Nonce Checks
3
Capability Checks
1
File Operations
0
External Requests
4
Bundled Libraries
0

Output Escaping

100% escaped40 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
acta_settings_page (acta-pay-per-article.php:393)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Acta — Pay Per Article Attack Surface

Entry Points1
Unprotected0

REST API Routes 1

GET/wp-json/acta/v1/contentacta-pay-per-article.php:675
WordPress Hooks 9
actionupgrader_process_completeacta-pay-per-article.php:128
actionadmin_initacta-pay-per-article.php:148
actionadmin_menuacta-pay-per-article.php:172
actionadmin_enqueue_scriptsacta-pay-per-article.php:173
actionadmin_initacta-pay-per-article.php:201
actionwp_enqueue_scriptsacta-pay-per-article.php:644
filterscript_loader_tagacta-pay-per-article.php:663
actionrest_api_initacta-pay-per-article.php:673
filterthe_contentacta-pay-per-article.php:965
Maintenance & Trust

Acta — Pay Per Article Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 22, 2026
PHP min version7.4
Downloads81

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Acta — Pay Per Article Developer Profile

readwithacta

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Acta — Pay Per Article

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/acta-pay-per-article/dist/css/style.css/wp-content/plugins/acta-pay-per-article/dist/js/acta.js/wp-content/plugins/acta-pay-per-article/dist/js/checkout.js/wp-content/plugins/acta-pay-per-article/dist/js/admin.js
Script Paths
https://js.stripe.com/v3/
Version Parameters
acta-pay-per-article/dist/css/style.css?ver=acta-pay-per-article/dist/js/acta.js?ver=acta-pay-per-article/dist/js/checkout.js?ver=acta-pay-per-article/dist/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
acta-article-wrapperacta-paywall-wrapperacta-checkout-buttonacta-embedded-checkout
HTML Comments
<!-- Acta Pay Per Article --><!-- End Acta Pay Per Article -->
Data Attributes
data-acta-publisher-iddata-acta-article-iddata-acta-checkout-urldata-acta-article-price
JS Globals
ActaCheckoutacta_checkout_params
Shortcode Output
[acta_article_checkout][acta_paywall]
FAQ

Frequently Asked Questions about Acta — Pay Per Article