Easy WP Voting With Payment Security & Risk Analysis

wordpress.org/plugins/easy-wp-voting-with-payment

Easy WP Voting With Payment allows you to create a simple voting system with payment method

70 active installs v2.5.0 PHP 5.6+ WP 4.7+ Updated Feb 2, 2024
mastercardpaymentpaystackvisavote
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Easy WP Voting With Payment Safe to Use in 2026?

Generally Safe

Score 85/100

Easy WP Voting With Payment has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "easy-wp-voting-with-payment" v2.5.0 plugin exhibits a mixed security posture. While it demonstrates good practices such as using prepared statements for all SQL queries and having a clean vulnerability history with no recorded CVEs, significant concerns arise from its attack surface and output sanitization. The presence of two AJAX handlers without authentication checks creates a direct entry point for unauthenticated attackers. This is a critical oversight, as these handlers could potentially be exploited to perform unauthorized actions if they are not properly secured at the application logic level.

Furthermore, the taint analysis indicates two flows with unsanitized paths, which, although not classified as critical or high severity, warrant attention. Coupled with the static analysis revealing that only 27% of output is properly escaped, there's a notable risk of Cross-Site Scripting (XSS) vulnerabilities. The lack of proper escaping in over 70% of outputs means that malicious input could be rendered directly in the browser, potentially leading to session hijacking or other client-side attacks. The plugin's history of no vulnerabilities is positive but doesn't mitigate the immediate risks identified in the current code analysis.

Key Concerns

  • AJAX handlers without authentication checks
  • Low percentage of properly escaped output
  • Taint flows with unsanitized paths
Vulnerabilities
None known

Easy WP Voting With Payment Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Easy WP Voting With Payment Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
38
14 escaped
Nonce Checks
5
Capability Checks
5
File Operations
0
External Requests
1
Bundled Libraries
1

Bundled Libraries

jQuery

Output Escaping

27% escaped52 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
ewvwp_ajax (ajax.php:13)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Easy WP Voting With Payment Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

noprivwp_ajax_ewvwp_form_ajaxajax.php:10
authwp_ajax_ewvwp_form_ajaxajax.php:11

Shortcodes 1

[ewvwp_plugin] easy-wp-voting-with-payment.php:73
WordPress Hooks 18
actioninitadmin\custom-post-type.php:9
actioninitadmin\custom-post-type.php:10
filtermanage_ewvwp_posts_columnsadmin\custom-post-type.php:11
filtermanage_edit-ewvwp-category_columnsadmin\custom-post-type.php:12
actionmanage_ewvwp_posts_custom_columnadmin\custom-post-type.php:13
filtermanage_ewvwp-category_custom_columnadmin\custom-post-type.php:14
actionadd_meta_boxesadmin\custom-post-type.php:15
actionsave_postadmin\custom-post-type.php:16
actionsave_postadmin\custom-post-type.php:17
actionsave_postadmin\custom-post-type.php:18
actionsave_postadmin\custom-post-type.php:19
actionsave_postadmin\custom-post-type.php:20
filtergettextadmin\custom-post-type.php:22
actionwp_loadedadmin\custom-post-type.php:24
filterpost_updated_messagesadmin\custom-post-type.php:26
actionwp_enqueue_scriptseasy-wp-voting-with-payment.php:92
actionadmin_initfunctions.php:18
actionadmin_menufunctions.php:20
Maintenance & Trust

Easy WP Voting With Payment Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedFeb 2, 2024
PHP min version5.6
Downloads10K

Community Trust

Rating72/100
Number of ratings5
Active installs70
Developer Profile

Easy WP Voting With Payment Developer Profile

Muhideen Mujeeb Adeoye

1 plugin · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Easy WP Voting With Payment

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/easy-wp-voting-with-payment/assets/css/style.css/wp-content/plugins/easy-wp-voting-with-payment/assets/css/sweetalert.css/wp-content/plugins/easy-wp-voting-with-payment/assets/js/jquery.min.js/wp-content/plugins/easy-wp-voting-with-payment/assets/js/script.js/wp-content/plugins/easy-wp-voting-with-payment/assets/js/sweetalert.js
Script Paths
https://js.paystack.co/v1/inline.js
Version Parameters
easy-wp-voting-with-payment/assets/css/style.css?ver=easy-wp-voting-with-payment/assets/css/sweetalert.css?ver=easy-wp-voting-with-payment/assets/js/jquery.min.js?ver=easy-wp-voting-with-payment/assets/js/script.js?ver=easy-wp-voting-with-payment/assets/js/sweetalert.js?ver=

HTML / DOM Fingerprints

CSS Classes
updatednoticeis-dismissible
Data Attributes
data-contest
JS Globals
ewvwp_params
Shortcode Output
[ewvwp_plugin][ewvwp_plugin contest="all"]
FAQ

Frequently Asked Questions about Easy WP Voting With Payment