Content For Money Security & Risk Analysis

wordpress.org/plugins/content-for-money

THE NON MEMBERS, WHO PAY TO READ THE HIDDEN CONTENT, ARE ABLE TO READ ONLY ONCE THE HIDDEN CONTENT. IF THEY VISIT AGAIN THEY MUST PAY AGAIN TO READ TH …

10 active installs v1.1.4 PHP + WP 3.0.0+ Updated Jul 9, 2018
free-for-membershide-contentpay-to-see-contentpaypal
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Content For Money Safe to Use in 2026?

Generally Safe

Score 85/100

Content For Money has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "content-for-money" plugin v1.1.4 presents a mixed security posture. On the positive side, it shows no known CVEs and utilizes prepared statements for all its SQL queries, which are crucial for preventing SQL injection vulnerabilities. The absence of file operations and external HTTP requests also reduces the attack surface in those areas. However, significant concerns arise from the static analysis.

The most critical finding is that 0% of the total 6 output locations are properly escaped. This lack of output escaping leaves the plugin highly susceptible to Cross-Site Scripting (XSS) attacks, where malicious scripts could be injected and executed within the WordPress dashboard or on the frontend, depending on where the content is displayed. While the plugin has only one entry point (a shortcode) and it has a capability check, the lack of proper output sanitization for any data displayed via that shortcode is a major weakness.

The vulnerability history is currently clean, indicating a positive track record. However, this history does not mitigate the identified XSS risk from the static analysis. The taint analysis shows one flow with an unsanitized path, but this did not reach critical or high severity, which is a small positive. In conclusion, while the plugin avoids common pitfalls like raw SQL queries and has a clean CVE history, the complete absence of output escaping creates a substantial XSS risk that needs immediate attention.

Key Concerns

  • No output escaping
  • Unsanitized path in taint analysis
Vulnerabilities
None known

Content For Money Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Content For Money Release Timeline

v1.1.4Current
v1.1.3
v1.1.2
v1.1.1
v1.1.0
v1.0
Code Analysis
Analyzed Mar 17, 2026

Content For Money Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
printAdminPanel (contentformoney.php:38)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Content For Money Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[paycontent] contentformoney.php:217
WordPress Hooks 3
filtercomment_textcontentformoney.php:167
actionadmin_menucontentformoney.php:215
actionactivate_contentformoney/contentformoney.phpcontentformoney.php:216
Maintenance & Trust

Content For Money Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJul 9, 2018
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Content For Money Developer Profile

Panagiotis Angelidis

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Content For Money

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[paycontent][/paycontent][paycontent amount='']
FAQ

Frequently Asked Questions about Content For Money