Freezy Stripe Security & Risk Analysis

wordpress.org/plugins/freezy-stripe

A free and easy (get it?) way to take Stripe payments on your website!

10 active installs v1.0.0 PHP + WP 3.0.1+ Updated Apr 29, 2016
freepaymentstripestripe-payment
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Freezy Stripe Safe to Use in 2026?

Generally Safe

Score 85/100

Freezy Stripe has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "freezy-stripe" plugin version 1.0.0 presents a generally good security posture based on the static analysis. The absence of dangerous functions, external HTTP requests, and file operations, coupled with the use of prepared statements for all SQL queries, are strong indicators of secure coding practices. The fact that all identified flows passed taint analysis without unsanitized paths further bolsters confidence in its current state. However, a significant concern lies in the output escaping. With 43% of outputs properly escaped, it means a substantial portion (57%) are not, creating a risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled carefully within these unescaped outputs.

The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive sign. This suggests a track record of security awareness or, conversely, that the plugin may not have been extensively tested or targeted. The lack of capability checks on its single entry point (a shortcode) is a potential weakness, as it implies that any logged-in user could potentially trigger its functionality. While there's a nonce check present, its effectiveness is limited if capability checks are absent.

In conclusion, "freezy-stripe" v1.0.0 demonstrates strengths in data handling and SQL security. The primary weakness is the insufficient output escaping, posing a direct XSS risk. The absence of capability checks on the shortcode is another area for improvement. While the lack of vulnerability history is good, it should not be mistaken for guaranteed security. Users should remain vigilant regarding the output escaping and consider if the shortcode's functionality requires stricter access controls.

Key Concerns

  • Insufficient output escaping
  • Missing capability check on shortcode
Vulnerabilities
None known

Freezy Stripe Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Freezy Stripe Release Timeline

v1.0.0Current
Code Analysis
Analyzed Apr 16, 2026

Freezy Stripe Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
43
32 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

43% escaped75 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
form_capture (classes/FreezyStripe/Controller.php:160)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Freezy Stripe Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[freezy_stripe] freezy-stripe.php:48
WordPress Hooks 12
actioninitfreezy-stripe.php:39
actioninitfreezy-stripe.php:42
actioninitfreezy-stripe.php:45
actionadmin_menufreezy-stripe.php:54
actionadmin_initfreezy-stripe.php:57
actionadmin_initfreezy-stripe.php:60
filterenter_title_herefreezy-stripe.php:63
actionadd_meta_boxes_freezy_paymentfreezy-stripe.php:66
filtermanage_freezy_payment_posts_columnsfreezy-stripe.php:69
actionmanage_freezy_payment_posts_custom_columnfreezy-stripe.php:70
actionsave_postfreezy-stripe.php:73
actionadmin_menufreezy-stripe.php:79
Maintenance & Trust

Freezy Stripe Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedApr 29, 2016
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Freezy Stripe Developer Profile

Tony DeStefano

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Freezy Stripe

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/freezy-stripe/css/freezy-stripe.css/wp-content/plugins/freezy-stripe/js/freezy-stripe.js
Script Paths
https://checkout.stripe.com/checkout.js
Version Parameters
freezy-stripe.css?ver=freezy-stripe.js?ver=

HTML / DOM Fingerprints

CSS Classes
freezy_stripe_form
Data Attributes
data-publishable-key
Shortcode Output
<form class="freezy_stripe_form" method="post" action="">
FAQ

Frequently Asked Questions about Freezy Stripe