IDPay For MyCred Security & Risk Analysis

wordpress.org/plugins/idpay-mycred

After installing and enabling this plugin, your customers can pay through IDPay gateway.

10 active installs v1.2.2 PHP + WP + Updated Nov 13, 2022
creditgatewayidpaymycredpoint
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is IDPay For MyCred Safe to Use in 2026?

Generally Safe

Score 85/100

IDPay For MyCred has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The idpay-mycred plugin, version 1.2.2, exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by exclusively using prepared statements for all SQL queries and appears to have no known past vulnerabilities. The absence of a significant attack surface, including no detected AJAX handlers, REST API routes, shortcodes, or cron events, is also a strength. However, significant concerns arise from the static analysis. A notable 49% of output escaping is not properly handled, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is ever rendered without sanitization. Furthermore, all seven analyzed taint flows originate from unsanitized paths, although they are not flagged as critical or high severity, this suggests a general lack of input validation and sanitization within the plugin's logic. The presence of external HTTP requests without clear authentication or authorization checks could also pose a risk if the plugin communicates with sensitive endpoints. In conclusion, while the plugin avoids common pitfalls like raw SQL and known CVEs, the substantial number of unsanitized taint flows and the significant percentage of unescaped output are notable weaknesses that require attention to improve its overall security.

Key Concerns

  • Unescaped output detected
  • Taint flows with unsanitized paths
  • External HTTP request without auth checks
Vulnerabilities
None known

IDPay For MyCred Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

IDPay For MyCred Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
21
20 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

49% escaped41 total outputs
Data Flows
7 unsanitized

Data Flow Analysis

7 flows7 with unsanitized paths
mycred_idpay_plugins_loaded (class-mycred-gateway-idpay.php:5)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

IDPay For MyCred Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionplugins_loadedclass-mycred-gateway-idpay.php:3
filtermycred_setup_gatewaysclass-mycred-gateway-idpay.php:7
filtermycred_buycred_refsclass-mycred-gateway-idpay.php:17
filtermycred_buycred_log_refsclass-mycred-gateway-idpay.php:25
filterwp_body_openclass-mycred-gateway-idpay.php:33
filtermycred_dropdown_currenciesclass-mycred-gateway-idpay.php:111
filtermycred_run_thisclass-mycred-gateway-idpay.php:294
actioninitidpay-mycred.php:25
Maintenance & Trust

IDPay For MyCred Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedNov 13, 2022
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

IDPay For MyCred Developer Profile

IDPay

7 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect IDPay For MyCred

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/idpay-mycred/assets/logo.svg

HTML / DOM Fingerprints

CSS Classes
mycred_idpay_messagemycred_idpay_message errormycred_idpay_message success
Data Attributes
name="mycred-gateway-idpay-currency"
FAQ

Frequently Asked Questions about IDPay For MyCred