OKPAY Payment gateway Security & Risk Analysis

wordpress.org/plugins/okpay-payment-gateway

This payment module extends WooCommerce and allows you to accept payments via OKPAY.

10 active installs v0.1 PHP + WP 3.0.1+ Updated Dec 6, 2012
extensiongatewayokpayshopping-cartwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is OKPAY Payment gateway Safe to Use in 2026?

Generally Safe

Score 85/100

OKPAY Payment gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The plugin "okpay-payment-gateway" v0.1 demonstrates a mixed security posture. On the positive side, there are no identified vulnerabilities in its history, and the static analysis shows no dangerous functions, file operations, or SQL queries that aren't using prepared statements. The absence of taint flows and critical/high severity issues further contributes to a seemingly clean codebase. However, several concerning practices are evident.

The most significant concern is the complete lack of nonce checks and capability checks. This, coupled with the fact that there are 0 unprotected entry points (AJAX, REST API, shortcodes, cron events), is contradictory and raises suspicion. It's highly unusual for a plugin to have no entry points but also no security checks on them if they did exist. The low percentage of properly escaped output (29%) suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities, especially given the presence of an external HTTP request which could potentially be influenced by user input.

Overall, while the plugin lacks a history of known vulnerabilities, the static analysis reveals significant architectural security weaknesses. The absence of nonce and capability checks, combined with poor output escaping, creates a substantial risk of exploitation, particularly for XSS. The contradictory report on attack surface and unprotected points warrants further investigation, but based on the data provided, the potential for vulnerabilities is high due to the lack of fundamental security mechanisms.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Low output escaping percentage (29%)
  • Presence of external HTTP requests
Vulnerabilities
None known

OKPAY Payment gateway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

OKPAY Payment gateway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

29% escaped7 total outputs
Attack Surface

OKPAY Payment gateway Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedOKpay payment gateway.php:10
actioninitOKpay payment gateway.php:29
actionwoocommerce_update_options_payment_gatewaysOKpay payment gateway.php:30
actionwoocommerce_thankyou_OkaypayOKpay payment gateway.php:31
actionwoocommerce_receipt_OkaypayOKpay payment gateway.php:32
filterwoocommerce_payment_gatewaysOKpay payment gateway.php:320
Maintenance & Trust

OKPAY Payment gateway Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedDec 6, 2012
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

OKPAY Payment gateway Developer Profile

saadat68

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect OKPAY Payment gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/okpay-payment-gateway/logo.png

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about OKPAY Payment gateway