Bizappay for GiveWP Security & Risk Analysis

wordpress.org/plugins/bizappay-for-givewp

Bizappay for GiveWP.

10 active installs v1.0.0 PHP + WP 5.8+ Updated Nov 24, 2021
bizappaydonategivepayment-gateway
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Bizappay for GiveWP Safe to Use in 2026?

Generally Safe

Score 85/100

Bizappay for GiveWP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "bizappay-for-givewp" plugin version 1.0.0 exhibits a concerning security posture primarily due to its unprotected entry points. While the plugin demonstrates good practices in avoiding dangerous functions, utilizing prepared statements for SQL queries, and properly escaping output, the absence of authentication checks on both of its AJAX handlers presents a significant risk. These handlers can be considered direct entry points for malicious actors, allowing them to potentially trigger unintended actions or access sensitive data if not properly secured within the plugin's logic.

The static analysis reveals a small attack surface, but the fact that all identified entry points are unprotected is a major weakness. There are no observed taint flows or known vulnerabilities in the plugin's history, which is a positive indicator. However, the lack of vulnerability history doesn't necessarily imply perfect security; it could also mean the plugin hasn't been extensively scrutinized or targeted. The absence of nonce checks and capability checks on the AJAX handlers exacerbates the risk, as these are standard security measures to prevent cross-site request forgery (CSRF) and unauthorized access.

In conclusion, the "bizappay-for-givewp" plugin v1.0.0 has some strong security fundamentals regarding data handling and output. However, the critical lack of authentication and authorization on its AJAX handlers creates a substantial vulnerability. This oversight needs immediate attention to prevent potential security breaches. The plugin's clean history is a good sign, but it should not lead to complacency, especially given the identified entry point vulnerabilities.

Key Concerns

  • AJAX handlers without auth checks
  • AJAX handlers without capability checks
  • AJAX handlers without nonce checks
Vulnerabilities
None known

Bizappay for GiveWP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Bizappay for GiveWP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped7 total outputs
Attack Surface
2 unprotected

Bizappay for GiveWP Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

noprivwp_ajax_payment_callback_actionindex.php:279
authwp_ajax_payment_callback_actionindex.php:282
WordPress Hooks 5
filtergive_payment_gatewaysindex.php:51
filtergive_get_sections_gatewaysindex.php:70
filtergive_get_settings_gatewaysindex.php:135
actiongive_bizappay_cc_formindex.php:175
actiongive_gateway_bizappayindex.php:248
Maintenance & Trust

Bizappay for GiveWP Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedNov 24, 2021
PHP min version
Downloads904

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Bizappay for GiveWP Developer Profile

Laratech Systems

3 plugins · 110 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Bizappay for GiveWP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Bizappay for GiveWP