ExpressPay Payment Module Security & Risk Analysis

wordpress.org/plugins/express-pay

WordPress plugin for accepting payments through Express Pay service via ERIP, bank cards and E-POS.

20 active installs v1.4.0 PHP 5.6+ WP 4.0+ Updated Apr 8, 2026
bank-cardse-poserippayment
98
A · Safe
CVEs total1
Unpatched0
Last CVENov 19, 2024
Safety Verdict

Is ExpressPay Payment Module Safe to Use in 2026?

Generally Safe

Score 98/100

ExpressPay Payment Module has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Nov 19, 2024Updated 1mo ago
Risk Assessment

The express-pay plugin v1.4.0 exhibits a mixed security posture. On the positive side, it demonstrates strong practices with 100% of its SQL queries using prepared statements and nearly all output being properly escaped, indicating good defense against common web vulnerabilities. The absence of dangerous functions and bundled outdated libraries is also encouraging.

However, significant concerns arise from the attack surface. With a total of 10 entry points, a concerning 9 of them are AJAX handlers that lack authentication checks. This creates a substantial vulnerability if these handlers are susceptible to manipulation. The taint analysis further highlights this, revealing one high-severity flow, which, when combined with the unprotected AJAX handlers, suggests a potential for exploitation. The vulnerability history, including a past high-severity SQL injection vulnerability, reinforces the need for vigilance, especially regarding input validation and access control, even though the current version has no unpatched CVEs.

In conclusion, while the plugin employs good practices in SQL and output handling, the numerous unprotected AJAX endpoints represent a critical weakness. The past SQL injection vulnerability and the current high-severity taint flow necessitate careful review and remediation of these access control issues to mitigate the risk of unauthorized actions.

Key Concerns

  • 9 unprotected AJAX handlers
  • 1 high severity taint flow
  • 1 high severity historical CVE
Vulnerabilities
1 published

ExpressPay Payment Module Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

CVE-2024-52474high · 7.5Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Express Payments Module <= 1.1.8 - Unauthenticated SQL Injection via type_id

Nov 19, 2024 Patched in 1.1.9 (8d)
Version History

ExpressPay Payment Module Release Timeline

v1.4.0Current
v1.3.0
v1.2.1
v1.1.9
v1.1.81 CVE
v1.1.71 CVE
v1.1.61 CVE
v1.1.51 CVE
v1.1.41 CVE
v1.1.31 CVE
v1.1.21 CVE
v1.1.11 CVE
v1.1.01 CVE
v1.0.01 CVE
Code Analysis
Analyzed Apr 16, 2026

ExpressPay Payment Module Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
15 prepared
Unescaped Output
3
373 escaped
Nonce Checks
5
Capability Checks
1
File Operations
2
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared15 total queries

Output Escaping

99% escaped376 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

9 flows2 with unsanitized paths
<class.expresspay> (class.expresspay.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
9 unprotected

ExpressPay Payment Module Attack Surface

Entry Points10
Unprotected9

AJAX Handlers 9

authwp_ajax_expresspay_receive_notificationexpresspay.payment.php:50
noprivwp_ajax_expresspay_receive_notificationexpresspay.payment.php:51
authwp_ajax_expresspay_get_form_dataexpresspay.payment.php:54
noprivwp_ajax_expresspay_get_form_dataexpresspay.payment.php:55
authwp_ajax_expresspay_check_invoiceexpresspay.payment.php:58
noprivwp_ajax_expresspay_check_invoiceexpresspay.payment.php:59
authwp_ajax_expresspay_get_test_mode_paramsexpresspay.payment.php:62
noprivwp_ajax_expresspay_get_test_mode_paramsexpresspay.payment.php:63
authwp_ajax_expresspay_payment_optionsexpresspay.payment.php:65

Shortcodes 1

[expresspay_payment] expresspay.payment.php:47
WordPress Hooks 1
actionadmin_menuexpresspay.payment.php:44
Maintenance & Trust

ExpressPay Payment Module Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedApr 8, 2026
PHP min version5.6
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

ExpressPay Payment Module Developer Profile

Сервис "Экспресс Платежи"

4 plugins · 100 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
8 days
View full developer profile
Detection Fingerprints

How We Detect ExpressPay Payment Module

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/express-pay/css/styles.css/wp-content/plugins/express-pay/css/bootstrap.min.css/wp-content/plugins/express-pay/css/admin.css
Version Parameters
express-pay/css/styles.css?ver=express-pay/css/bootstrap.min.css?ver=express-pay/css/admin.css?ver=

HTML / DOM Fingerprints

REST Endpoints
/wp-json/expresspay/
Shortcode Output
[expresspay_payment]
FAQ

Frequently Asked Questions about ExpressPay Payment Module