
myCred WP Simple Pay – Stripe Payment Addon Security & Risk Analysis
wordpress.org/plugins/mycred-wp-simple-pay-addon📢🚨 Important Notice: myCred WP Simple Pay is now part of the myCred Toolkit and will no longer receive updates here. Only security fixes will be provi …
Is myCred WP Simple Pay – Stripe Payment Addon Safe to Use in 2026?
Generally Safe
Score 100/100myCred WP Simple Pay – Stripe Payment Addon has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "mycred-wp-simple-pay-addon" v1.1 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified entry points (AJAX handlers, REST API routes, shortcodes, cron events) significantly limits the potential attack surface. Furthermore, the static analysis found no dangerous functions, no external HTTP requests, and no file operations, which are all positive indicators. The lack of any recorded vulnerabilities or CVEs in its history suggests a well-maintained and secure codebase.
However, a notable concern arises from the single SQL query identified, which is not using prepared statements. This presents a risk of SQL injection vulnerabilities, even though it's a single instance. Additionally, the relatively low percentage of properly escaped output (38%) indicates a risk of Cross-Site Scripting (XSS) vulnerabilities, especially if user-supplied data is being outputted without sufficient sanitization. The absence of nonce and capability checks on any potential (though currently unlisted) entry points is also a weakness that could be exploited if entry points are added or if the analysis was incomplete.
In conclusion, while the plugin benefits from a minimal attack surface and a clean vulnerability history, the identified SQL query issue and the significant number of unescaped outputs are critical areas that require immediate attention. Addressing these specific code-level weaknesses will significantly improve the overall security of the plugin.
Key Concerns
- Raw SQL query without prepared statements
- Low percentage of properly escaped output
- No nonce checks detected
- No capability checks detected
myCred WP Simple Pay – Stripe Payment Addon Security Vulnerabilities
myCred WP Simple Pay – Stripe Payment Addon Code Analysis
SQL Query Safety
Output Escaping
myCred WP Simple Pay – Stripe Payment Addon Attack Surface
WordPress Hooks 7
Maintenance & Trust
myCred WP Simple Pay – Stripe Payment Addon Maintenance & Trust
Maintenance Signals
Community Trust
myCred WP Simple Pay – Stripe Payment Addon Alternatives
WPLMS MyCred AddOn
wplms-mycred-addon
Connect WP LMS with MyCred platform
myCred – Gutenberg Blocks
mycred-blocks
myCred Gutenberg plugin which allows admin to add myCred shortcode with Gutenberg blocks. Admin can manage myCred shortcodes in the settings of Gutenb …
myCred H5P
mycred-h5p
📢🚨 Important Notice: myCred H5P is now part of the myCred Toolkit and will no longer receive updates here. Only security fixes will be provided.
myCred – Learndash
mycred-learndash
📢 Important Notice: myCred Learndash is now part of the myCred Toolkit and will no longer receive updates here. Only security fixes will be provided.
myCred Birthdays
mycred-birthdays
📢 🚨 Important Notice: The myCred Birthdays is now part of myCred Core plugin and will no longer receive updates here. Only security fixes will be prov …
myCred WP Simple Pay – Stripe Payment Addon Developer Profile
84 plugins · 1.4M total installs
How We Detect myCred WP Simple Pay – Stripe Payment Addon
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/mycred-wp-simple-pay-addon/assets/js/script.jsassets/js/script.jsmycred-wp-simple-pay-addon/assets/js/script.js?ver=HTML / DOM Fingerprints
noticenotice-erroris-dismissible