iPint Payment Gateway Security & Risk Analysis

wordpress.org/plugins/ipint-payments-gateway

The iPint Crypto Payment Gateway plugin extends WooCommerce allowing you to take payments in crypto directly on your store or website via iPint's …

0 active installs v1.0 PHP 7.0+ WP 4.2+ Updated Jun 16, 2022
bitcoinbitcoin-cashdogecoinlitecoinusdt
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is iPint Payment Gateway Safe to Use in 2026?

Generally Safe

Score 85/100

iPint Payment Gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "ipint-payments-gateway" v1.0 plugin exhibits a generally positive security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events, particularly those without proper authorization, significantly limits the potential attack surface. Furthermore, the code signals indicate a good practice of using prepared statements for all SQL queries, and a high percentage of output escaping is observed. File operations and external HTTP requests are present but are not inherently concerning without further context or observed vulnerabilities.

However, several areas warrant attention. The presence of a taint flow with unsanitized paths is a critical finding, despite its classification as not critical or high severity in this analysis. This indicates a potential risk where user-supplied data might be used in a way that could lead to unintended consequences, such as directory traversal or command injection, if exploited. The complete lack of nonce checks and capability checks across all identified entry points (even though there are zero) is a significant concern if any entry points were to be introduced or discovered later. This indicates a reliance on the inherent security of the (currently non-existent) entry points rather than implementing robust security measures.

The vulnerability history showing zero known CVEs and no past vulnerabilities is a strong positive indicator of the plugin's current security. It suggests a developer who has either been diligent about security or the plugin has not been a significant target. Despite the positive historical data, the presence of an unsanitized path flow in the static analysis is a red flag that needs to be addressed immediately, as historical data does not guarantee future security. The overall assessment is that while the plugin has a minimal attack surface and good SQL practices, the identified taint flow and the absence of fundamental security checks like nonces and capability checks are weaknesses that could be exploited.

Key Concerns

  • Taint flow with unsanitized paths
  • 0 Nonce checks
  • 0 Capability checks
  • Low percentage of properly escaped output (86%)
Vulnerabilities
None known

iPint Payment Gateway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

iPint Payment Gateway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
30 escaped
Nonce Checks
0
Capability Checks
0
File Operations
4
External Requests
3
Bundled Libraries
0

Output Escaping

86% escaped35 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<ipint-website-redirect-url> (templates\ipint-website-redirect-url.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

iPint Payment Gateway Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionwoocommerce_scheduled_subscription_payment_ipintincludes\class-wc-gateway-ipint.php:48
actionplugins_loadedipint-woocommerce-gateway.php:37
filtergenerate_rewrite_rulesipint-woocommerce-gateway.php:39
filterquery_varsipint-woocommerce-gateway.php:40
actiontemplate_redirectipint-woocommerce-gateway.php:41
filterwoocommerce_payment_gatewaysipint-woocommerce-gateway.php:44
actionwoocommerce_admin_order_data_after_order_detailsipint-woocommerce-gateway.php:47
actionwoocommerce_thankyouipint-woocommerce-gateway.php:49
actionwoocommerce_email_order_detailsipint-woocommerce-gateway.php:51
filterquery_varsipint-woocommerce-gateway.php:198
actiontemplate_includeipint-woocommerce-gateway.php:204
filtertemplate_includeipint-woocommerce-gateway.php:212
actiontemplate_redirectipint-woocommerce-gateway.php:217
Maintenance & Trust

iPint Payment Gateway Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedJun 16, 2022
PHP min version7.0
Downloads735

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

iPint Payment Gateway Developer Profile

bitfia

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect iPint Payment Gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ipint-payments-gateway/assets/css/ipint-payment-gateway.css/wp-content/plugins/ipint-payments-gateway/assets/js/ipint-payment-gateway.js
Script Paths
/wp-content/plugins/ipint-payments-gateway/assets/js/ipint-payment-gateway.js
Version Parameters
ipint-payment-gateway/assets/css/ipint-payment-gateway.css?ver=ipint-payment-gateway/assets/js/ipint-payment-gateway.js?ver=

HTML / DOM Fingerprints

CSS Classes
order_data_columnipint-payment-gateway-button
HTML Comments
<!-- iPint Payments gateway --><!-- Display order meta fields on mail --><!-- Display order meta fields on order received page --><!-- to display meta fields in admin order detail page -->
Data Attributes
data-order-iddata-amountdata-currencydata-order-keydata-api-url
JS Globals
ipint_payment_gateway
FAQ

Frequently Asked Questions about iPint Payment Gateway