BP Authorize.net Security & Risk Analysis

wordpress.org/plugins/bp-authnet

Simple Authorize.net payment class

10 active installs v1.0 PHP + WP + Updated Jun 20, 2010
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is BP Authorize.net Safe to Use in 2026?

Generally Safe

Score 85/100

BP Authorize.net has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The bp-authnet v1.0 plugin exhibits a mixed security posture. On the positive side, the plugin has no recorded vulnerabilities, including no known CVEs. The static analysis indicates a very small attack surface with zero AJAX handlers, REST API routes, shortcodes, or cron events, and all identified SQL queries utilize prepared statements. This suggests a foundational level of secure coding practice.

However, significant concerns arise from the output escaping. With 17 total outputs and 0% properly escaped, this represents a critical weakness. Any dynamic data rendered on the frontend or backend that is not properly escaped is highly susceptible to Cross-Site Scripting (XSS) attacks. The single external HTTP request also warrants attention, as its purpose and how it handles the response should be scrutinized to ensure it doesn't introduce vulnerabilities. The lack of capability checks on any entry points, although the attack surface is currently zero, could become a problem if functionality is added in the future without proper authorization checks.

Given the absence of vulnerability history, it's difficult to infer long-term security trends, but it does suggest the plugin has not historically been a significant target or source of security issues. The primary weakness lies in the output escaping, which, if exploited, could lead to severe consequences. The overall conclusion is a plugin with good intentions and a small attack surface but a critical flaw in output handling that requires immediate attention.

Key Concerns

  • Unescaped output
  • External HTTP requests without clear handling
  • Lack of capability checks on entry points
Vulnerabilities
None known

BP Authorize.net Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

BP Authorize.net Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

BP Authorize.net Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped17 total outputs
Attack Surface

BP Authorize.net Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menubp-authnet-admin.php:11
actionadmin_headbp-authnet-admin.php:12
actioninitbp-authnet-admin.php:99
actionbp_setup_root_componentsbp-authnet-classes.php:7
actionbp_setup_globalsbp-authnet-classes.php:10
actionwp_headbp-authnet-classes.php:13
actionbp_initbp-authnet-loader.php:107
Maintenance & Trust

BP Authorize.net Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedJun 20, 2010
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Alternatives

BP Authorize.net Alternatives

No alternatives data available yet.

Developer Profile

BP Authorize.net Developer Profile

John James Jacoby

28 plugins · 331K total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
1401 days
View full developer profile
Detection Fingerprints

How We Detect BP Authorize.net

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about BP Authorize.net