
HadePay Security & Risk Analysis
wordpress.org/plugins/hadepayhadepay Plugin is very usefull to Payment Gateway so you can use it in your website.
Is HadePay Safe to Use in 2026?
Generally Safe
Score 85/100HadePay has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'hadepay' v1.0.0 plugin exhibits a generally good security posture based on the static analysis. The absence of entry points like AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the code appears to adhere to secure coding practices by exclusively using prepared statements for SQL queries and having no recorded vulnerability history. This suggests a proactive approach to security by the developers.
However, a few areas raise concerns that warrant attention. The low percentage of properly escaped output (14%) indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-provided data that is not properly escaped before being displayed could be exploited by attackers. Additionally, the presence of an external HTTP request without explicit details on its purpose or security checks could be a vector for various attacks, including server-side request forgery (SSRF) or data exfiltration if not handled securely.
While the plugin has no known CVEs, the static analysis highlights potential weaknesses. The lack of nonce checks on any potential entry points (though none are explicitly listed, the general lack of checks is concerning) and the low output escaping rate are the primary areas where vulnerabilities could arise. The single capability check suggests a basic level of access control, but its effectiveness is unknown without more context. Overall, the plugin has strong foundational security but requires immediate attention to its output escaping and careful scrutiny of its external HTTP requests.
Key Concerns
- Low output escaping percentage
- External HTTP request without details
- No nonce checks detected
HadePay Security Vulnerabilities
HadePay Code Analysis
Output Escaping
Data Flow Analysis
HadePay Attack Surface
WordPress Hooks 12
Maintenance & Trust
HadePay Maintenance & Trust
Maintenance Signals
Community Trust
HadePay Alternatives
No alternatives data available yet.
HadePay Developer Profile
2 plugins · 10 total installs
How We Detect HadePay
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/hadepay/css/admin-style.css/wp-content/plugins/hadepay/js/custom.jshttps://hadepay.com/assets/js/public.jshadepay/css/admin-style.css?ver=hadepay/js/custom.js?ver=HTML / DOM Fingerprints
left-option-panelright-option-panelheader-option-panelfooter-option-paneloption_save_changes<!--
Contributors: HadePay
Plugin Name: HadePay
Plugin URI: https://hadepay.com/wordpress
Tags: comments, spam
Author URI: https://hadepay.com/wordpress
Author: HadePay
Donate link: https://hadepay.com/wordpress
Requires at least: 4.1
Stable tag: 4.3
Version: 1.0.0
License: GPL2 or later
License URI: https://www.gnu.org/licenses/gpl-2.0.html
Tested up to: 5.1.1
-->name="option_action_changes"name="option_save_changes"name="hadepay_theme_option"name="optin_location"name="home_slider"HADEPAYOPTIONPATHHADEPAYOPTIONURLWC_Gateway_Offline/wp-json/wc/v3/products