FeexPay Security & Risk Analysis

wordpress.org/plugins/feexpay

A secure plugin to accept Mobile Money and Credit Card payments.

100 active installs v1.0.8 PHP 5.6+ WP 4.4+ Updated Oct 25, 2024
credit-carddigital-paymentmobile-moneyonline-paymentpayment-gateway
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is FeexPay Safe to Use in 2026?

Generally Safe

Score 92/100

FeexPay has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The feexpay v1.0.8 plugin exhibits a generally positive security posture based on static analysis, with no identified critical vulnerabilities in its code. The absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests is commendable. Furthermore, the plugin has a clean vulnerability history with zero recorded CVEs, suggesting a good track record of secure development. However, there are areas for improvement. The taint analysis revealed two flows with unsanitized paths, which, while not rated critical or high, represent a potential risk if these paths are ever exposed to user input. The output escaping is also only 67% proper, meaning a portion of its output could be vulnerable to cross-site scripting (XSS) attacks. The lack of any nonce or capability checks, coupled with zero identified entry points, is unusual and might indicate a limited functionality or that entry points are not explicitly defined in a way that static analysis can detect. While the current absence of direct vulnerabilities is a strength, the presence of unsanitized paths and imperfect output escaping warrants attention to prevent future security issues.

Key Concerns

  • Unsanitized paths found in taint analysis
  • Output escaping is not consistently applied
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

FeexPay Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

FeexPay Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Guzzle

Output Escaping

67% escaped9 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
on_feexpay_back (includes\class-wc-feexpay-gateway.php:188)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

FeexPay Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterwoocommerce_payment_gatewayswp-feexpay.php:28
actionplugins_loadedwp-feexpay.php:38
actionbefore_woocommerce_initwp-feexpay.php:51
Maintenance & Trust

FeexPay Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedOct 25, 2024
PHP min version5.6
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

FeexPay Developer Profile

Feexpay

1 plugin · 100 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect FeexPay

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/feexpay/assets/css/style.css/wp-content/plugins/feexpay/assets/js/checkout.js/wp-content/plugins/feexpay/assets/js/invoke.js/wp-content/plugins/feexpay/assets/js/jscolor.js/wp-content/plugins/feexpay/assets/js/admin.js
Script Paths
https://api.feexpay.me/feexpay-javascript-sdk/wordpress.jshttps://api.feexpay.me/feexpay-javascript-sdk/wordpress-dev.js

HTML / DOM Fingerprints

CSS Classes
feexpay-button-init
HTML Comments
TODO: add transaction reason
Data Attributes
id="feexpay-button-init"
JS Globals
Feexpay
Shortcode Output
<button class="button alt wc-forward" id="feexpay-button-init">Payer</button>
FAQ

Frequently Asked Questions about FeexPay