HadePay Security & Risk Analysis

wordpress.org/plugins/hadepay

hadepay Plugin is very usefull to Payment Gateway so you can use it in your website.

0 active installs v1.0.0 PHP + WP + Updated Apr 30, 2019
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is HadePay Safe to Use in 2026?

Generally Safe

Score 85/100

HadePay has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The 'hadepay' v1.0.0 plugin exhibits a generally good security posture based on the static analysis. The absence of entry points like AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the code appears to adhere to secure coding practices by exclusively using prepared statements for SQL queries and having no recorded vulnerability history. This suggests a proactive approach to security by the developers.

However, a few areas raise concerns that warrant attention. The low percentage of properly escaped output (14%) indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-provided data that is not properly escaped before being displayed could be exploited by attackers. Additionally, the presence of an external HTTP request without explicit details on its purpose or security checks could be a vector for various attacks, including server-side request forgery (SSRF) or data exfiltration if not handled securely.

While the plugin has no known CVEs, the static analysis highlights potential weaknesses. The lack of nonce checks on any potential entry points (though none are explicitly listed, the general lack of checks is concerning) and the low output escaping rate are the primary areas where vulnerabilities could arise. The single capability check suggests a basic level of access control, but its effectiveness is unknown without more context. Overall, the plugin has strong foundational security but requires immediate attention to its output escaping and careful scrutiny of its external HTTP requests.

Key Concerns

  • Low output escaping percentage
  • External HTTP request without details
  • No nonce checks detected
Vulnerabilities
None known

HadePay Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

HadePay Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
24
4 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

14% escaped28 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
save_hadepay_theme_option (include\custom-functions.php:95)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

HadePay Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actionadmin_menuinclude\custom-functions.php:8
actionadmin_enqueue_scriptsinclude\custom-functions.php:43
actionadmin_initinclude\custom-functions.php:131
filterhadepay_theme_option_key_filterinclude\custom-functions.php:166
actionwp_headinclude\custom-functions.php:184
actionwp_footerinclude\custom-functions.php:197
filterwoocommerce_payment_gatewaysinclude\custom-functions.php:232
actionplugins_loadedinclude\custom-functions.php:259
actionwoocommerce_email_before_order_tableinclude\custom-functions.php:288
actionwoocommerce_after_checkout_forminclude\custom-functions.php:387
actionwoocommerce_thankyouinclude\custom-functions.php:406
actionadmin_noticesinclude\custom_gateway.php:39
Maintenance & Trust

HadePay Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedApr 30, 2019
PHP min version
Downloads899

Community Trust

Rating0/100
Number of ratings0
Active installs0
Alternatives

HadePay Alternatives

No alternatives data available yet.

Developer Profile

HadePay Developer Profile

Skysystemz

2 plugins · 10 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect HadePay

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hadepay/css/admin-style.css/wp-content/plugins/hadepay/js/custom.js
Script Paths
https://hadepay.com/assets/js/public.js
Version Parameters
hadepay/css/admin-style.css?ver=hadepay/js/custom.js?ver=

HTML / DOM Fingerprints

CSS Classes
left-option-panelright-option-panelheader-option-panelfooter-option-paneloption_save_changes
HTML Comments
<!-- Contributors: HadePay Plugin Name: HadePay Plugin URI: https://hadepay.com/wordpress Tags: comments, spam Author URI: https://hadepay.com/wordpress Author: HadePay Donate link: https://hadepay.com/wordpress Requires at least: 4.1 Stable tag: 4.3 Version: 1.0.0 License: GPL2 or later License URI: https://www.gnu.org/licenses/gpl-2.0.html Tested up to: 5.1.1 -->
Data Attributes
name="option_action_changes"name="option_save_changes"name="hadepay_theme_option"name="optin_location"name="home_slider"
JS Globals
HADEPAYOPTIONPATHHADEPAYOPTIONURLWC_Gateway_Offline
REST Endpoints
/wp-json/wc/v3/products
FAQ

Frequently Asked Questions about HadePay