Open Payout For Xero, QuickBooks and FreshBooks Security & Risk Analysis

wordpress.org/plugins/open-payout

Open Payout connects your WooCommerce store to Xero, Quickbooks or FreshBooks. https://vimeo.com/549587442 You take care of your store, we'll t …

10 active installs v1.4.6 PHP 5.6+ WP 5.1+ Updated Oct 30, 2023
accountingbookkeepingfreshbooksquickbooksxero
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Open Payout For Xero, QuickBooks and FreshBooks Safe to Use in 2026?

Generally Safe

Score 85/100

Open Payout For Xero, QuickBooks and FreshBooks has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The open-payout plugin v1.4.6 exhibits a mixed security posture. On the positive side, static analysis reveals no detected dangerous functions, no direct SQL queries, no file operations, no external HTTP requests, and no identified taint flows. This suggests a clean internal code structure regarding common vulnerability classes. The absence of known CVEs and any vulnerability history is also a strong indicator of diligent security practices by the developer. However, a significant concern is the complete lack of output escaping on all identified output points. This means that any data rendered by the plugin is not properly sanitized, creating a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, particularly reflected XSS if user-supplied data is part of these outputs. The absence of any capability checks or nonce checks, while not directly flagged as an attack vector due to the zero entry points, indicates a potential weakness if new entry points are added in future versions without proper security controls.

Key Concerns

  • No output escaping found
  • No capability checks
  • No nonce checks
Vulnerabilities
None known

Open Payout For Xero, QuickBooks and FreshBooks Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Open Payout For Xero, QuickBooks and FreshBooks Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Attack Surface

Open Payout For Xero, QuickBooks and FreshBooks Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menuopenpayout.php:30
Maintenance & Trust

Open Payout For Xero, QuickBooks and FreshBooks Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedOct 30, 2023
PHP min version5.6
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Open Payout For Xero, QuickBooks and FreshBooks Developer Profile

David Gates

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Open Payout For Xero, QuickBooks and FreshBooks

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<img src="https://openpayout.com/video/OpenPayoutForWooCommerce.mp4" type="video/mp4">
FAQ

Frequently Asked Questions about Open Payout For Xero, QuickBooks and FreshBooks