IntaSend Pay Button Security & Risk Analysis

wordpress.org/plugins/intasend-pay-button

Securely collect M-Pesa and card payments (Visa and Mastercard).

60 active installs v1.0.9 PHP 7.4+ WP 5.2+ Updated Jan 27, 2025
checkoutm-pesamastercardpaymentsvisa
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is IntaSend Pay Button Safe to Use in 2026?

Generally Safe

Score 92/100

IntaSend Pay Button has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "intasend-pay-button" v1.0.9 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of unpatched CVEs in its history is a significant positive indicator, suggesting a history of responsible development and timely patching. Furthermore, the code demonstrates good practices regarding output escaping (100% properly escaped) and judicious use of prepared statements for SQL queries (77%). The limited attack surface, with only one shortcode and no AJAX handlers or REST API routes exposed without proper checks, is also commendable.

However, a closer look at the taint analysis reveals a potential concern: one flow with an unsanitized path identified as "High severity". This indicates a possible vulnerability where user-supplied input might be used in a way that could lead to unexpected or malicious behavior, such as directory traversal or file manipulation, even if the static analysis didn't flag specific dangerous functions or file operations. The absence of capability checks across all entry points is also a weakness, as it means that access to functionalities might not be properly restricted based on user roles. While the vulnerability history is clean, the presence of an unsanitized path flow is the most significant risk identified.

In conclusion, while the plugin has a positive track record and good coding hygiene in many areas, the identified high-severity taint flow is a critical point of concern that requires immediate attention. The lack of capability checks, while not as severe as the taint flow, also represents an area for improvement to ensure robust access control. Addressing the unsanitized path is paramount to maintaining a secure plugin.

Key Concerns

  • High severity taint flow with unsanitized path
  • No capability checks on entry points
Vulnerabilities
None known

IntaSend Pay Button Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

IntaSend Pay Button Release Timeline

v1.0.0
Code Analysis
Analyzed Mar 16, 2026

IntaSend Pay Button Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
10 prepared
Unescaped Output
0
78 escaped
Nonce Checks
4
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

77% prepared13 total queries

Output Escaping

100% escaped78 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
INTAPYBTN_tt_render_list_page_callback (admin\admin-settings.php:244)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

IntaSend Pay Button Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[INTAPYBTN] shortcode.php:56
WordPress Hooks 8
actionadmin_initadmin\admin-settings.php:191
actionadmin_menuadmin\admin-settings.php:220
actionadmin_menuadmin\admin-settings.php:266
actionadmin_post_update_buttonadmin\admin-settings.php:369
filterthe_contentshortcode.php:55
actionplugins_loadedwp-intasend-online-payments.php:61
actionwp_enqueue_scriptswp-intasend-online-payments.php:62
actionplugins_loadedwp-intasend-online-payments.php:75
Maintenance & Trust

IntaSend Pay Button Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedJan 27, 2025
PHP min version7.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs60
Developer Profile

IntaSend Pay Button Developer Profile

Felix Cheruiyot

2 plugins · 460 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect IntaSend Pay Button

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/intasend-pay-button/assets/js/intasend-inline-min.js/wp-content/plugins/intasend-pay-button/assets/js/intasend-pay-btn.js/wp-content/plugins/intasend-pay-button/assets/css/style.css
Script Paths
assets/js/intasend-inline-min.jsassets/js/intasend-pay-btn.js
Version Parameters
version=1.0.0

HTML / DOM Fingerprints

CSS Classes
intaSendCustomBtnisPayBtn-
Data Attributes
data-card_tarrifdata-mobile_tarrifdata-amountdata-currencydata-redirect_urldata-api_ref+3 more
JS Globals
intBtnData
Shortcode Output
<button class="intaSendCustomBtn isPayBtn-<input id="isPayEmail-<input id="isPayAmount-
FAQ

Frequently Asked Questions about IntaSend Pay Button