FreedomPay Security & Risk Analysis

wordpress.org/plugins/freedompay-payment-gateway

It's pretty easy to receive payments with FreedomPay Payments Provider.

90 active installs v1.10.0 PHP 7.4+ WP 5.0+ Updated Mar 12, 2025
checkoutecommercepaymentswoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is FreedomPay Safe to Use in 2026?

Generally Safe

Score 92/100

FreedomPay has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The freedompay-payment-gateway plugin version 1.10.0 exhibits a generally positive security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events suggests a limited attack surface. Furthermore, the code signals are promising: no dangerous functions were detected, all SQL queries utilize prepared statements, and there are no recorded vulnerabilities or CVEs. This indicates a diligent effort to implement secure coding practices, particularly around data handling and preventing known exploits.

However, there are several areas of concern that temper the otherwise strong security profile. The most significant is the lack of any identified nonce checks or capability checks. This is a critical omission, as it means that any entry points, even if not explicitly listed, are not protected against unauthorized actions or CSRF attacks. Additionally, a substantial portion of output (32%) is not properly escaped, posing a risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is ever involved in these outputs. The presence of file operations and external HTTP requests, while not inherently insecure, introduces potential risks if not handled with extreme care and proper sanitization, especially given the absence of broader security checks.

In conclusion, while the plugin demonstrates strengths in SQL security and a clean vulnerability history, the absence of essential security mechanisms like nonce and capability checks, coupled with a notable percentage of unescaped output, presents tangible security risks. The limited attack surface is a positive, but it doesn't fully mitigate the inherent dangers of these missing fundamental security controls. Continuous monitoring for new vulnerabilities and addressing the output escaping and authorization checks are crucial for improving its overall security.

Key Concerns

  • Missing nonce checks on entry points
  • Missing capability checks on entry points
  • Significant unescaped output identified
  • File operations present without explicit sanitization context
  • External HTTP requests present without explicit sanitization context
Vulnerabilities
None known

FreedomPay Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

FreedomPay Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
21 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
1
Bundled Libraries
0

Output Escaping

68% escaped31 total outputs
Attack Surface

FreedomPay Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actionwoocommerce_blocks_loadedfreedompay-payment-gateway.php:54
filterwoocommerce_payment_gatewaysfreedompay-payment-gateway.php:55
actionadmin_enqueue_scriptsfreedompay-payment-gateway.php:66
actionbefore_woocommerce_initfreedompay-payment-gateway.php:68
actionplugins_loadedfreedompay-payment-gateway.php:74
actionwoocommerce_blocks_payment_method_type_registrationfreedompay-payment-gateway.php:114
actionwoocommerce_check_cart_itemsincludes\class-wc-freedompay-payment-gateway.php:68
actionwoocommerce_api_wc_freedompay_payment_gatewayincludes\class-wc-freedompay-payment-gateway.php:69
actionwoocommerce_receipt_freedompayincludes\class-wc-freedompay-payment-gateway.php:77
actionadmin_noticesincludes\class-wc-freedompay-payment-gateway.php:78
actionupdate_option_woocommerce_freedompay_settingsincludes\class-wc-freedompay-payment-gateway.php:79
Maintenance & Trust

FreedomPay Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedMar 12, 2025
PHP min version7.4
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs90
Developer Profile

FreedomPay Developer Profile

FreedomPay

1 plugin · 90 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect FreedomPay

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/freedompay-payment-gateway/assets/css/settings-custom.css/wp-content/plugins/freedompay-payment-gateway/assets/js/settings-custom.js/wp-content/plugins/freedompay-payment-gateway/assets/images/icon.png
Script Paths
/wp-content/plugins/freedompay-payment-gateway/assets/js/settings-custom.js
Version Parameters
freedompay-payment-gateway/assets/css/settings-custom.css?ver=freedompay-payment-gateway/assets/js/settings-custom.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-freedompay-method-id
JS Globals
freedompay_data
REST Endpoints
/wp-json/freedompay/v1/config
FAQ

Frequently Asked Questions about FreedomPay