Paid Downloads Security & Risk Analysis

wordpress.org/plugins/paid-downloads

The plugin allows to sell digital content and accept payments via PayPal, Payza or InterKassa. It delivers download link after completed payment.

100 active installs v3.15 PHP + WP 3.0+ Updated Aug 20, 2012
digital-shopdownloadpaymentpaypalsell
60
C · Use Caution
CVEs total1
Unpatched1
Last CVEJan 21, 2026
Safety Verdict

Is Paid Downloads Safe to Use in 2026?

Use With Caution

Score 60/100

Paid Downloads has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Jan 21, 2026Updated 13yr ago
Risk Assessment

The "paid-downloads" plugin v3.15 presents a mixed security posture. While it demonstrates good practices in minimizing its attack surface with no unprotected AJAX handlers or REST API routes, and a relatively low number of total entry points, several concerning code signals and taint analysis results highlight potential weaknesses. The significant number of SQL queries, with a substantial portion not using prepared statements, combined with a high number of taint flows with unsanitized paths (8 critically flagged), strongly suggests a risk of SQL injection vulnerabilities. The plugin's vulnerability history, which includes one known high-severity CVE specifically related to SQL Injection and a recent vulnerability disclosure, further reinforces this concern. The complete lack of nonce checks and limited capability checks, despite the presence of file operations and external HTTP requests, also represents a potential avenue for exploitation if these entry points are not properly secured. Therefore, while the plugin has some strengths in limiting immediate attack vectors, the underlying code quality issues and historical vulnerability patterns point to a moderate to high-risk profile, requiring prompt attention and remediation.

Key Concerns

  • High severity taint flows with unsanitized paths
  • Unpatched high severity CVE
  • SQL queries not using prepared statements
  • Lack of nonce checks
  • Low percentage of properly escaped output
  • Limited capability checks
Vulnerabilities
1

Paid Downloads Security Vulnerabilities

CVEs by Year

1 CVE in 2026 · unpatched
2026
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

CVE-2025-68857high · 7.5Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Paid Downloads <= 3.15 - Unauthenticated SQL Injection

Jan 21, 2026Unpatched
Code Analysis
Analyzed Mar 16, 2026

Paid Downloads Code Analysis

Dangerous Functions
0
Raw SQL Queries
18
15 prepared
Unescaped Output
31
65 escaped
Nonce Checks
0
Capability Checks
1
File Operations
9
External Requests
3
Bundled Libraries
0

SQL Query Safety

45% prepared33 total queries

Output Escaping

68% escaped96 total outputs
Data Flows
9 unsanitized

Data Flow Analysis

9 flows9 with unsanitized paths
shortcode_handler (paid-downloads.php:1643)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Paid Downloads Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[paid-downloads] paid-downloads.php:88
[paiddownloads] paid-downloads.php:89
WordPress Hooks 8
actionadmin_noticespaid-downloads.php:76
actionadmin_noticespaid-downloads.php:77
actionadmin_menupaid-downloads.php:78
actioninitpaid-downloads.php:79
actionadmin_headpaid-downloads.php:80
actioninitpaid-downloads.php:86
actionwp_headpaid-downloads.php:87
actionadmin_noticespaid-downloads.php:2001
Maintenance & Trust

Paid Downloads Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedAug 20, 2012
PHP min version
Downloads30K

Community Trust

Rating56/100
Number of ratings9
Active installs100
Developer Profile

Paid Downloads Developer Profile

ichurakov

7 plugins · 330 total installs

83
trust score
Avg Security Score
84/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Paid Downloads

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/paid-downloads/css/paid-downloads-admin.css/wp-content/plugins/paid-downloads/css/paid-downloads-front.css/wp-content/plugins/paid-downloads/js/paid-downloads-admin.js/wp-content/plugins/paid-downloads/js/paid-downloads-front.js
Script Paths
/wp-content/plugins/paid-downloads/js/paid-downloads-admin.js/wp-content/plugins/paid-downloads/js/paid-downloads-front.js
Version Parameters
paid-downloads/css/paid-downloads-admin.css?ver=paid-downloads/css/paid-downloads-front.css?ver=paid-downloads/js/paid-downloads-admin.js?ver=paid-downloads/js/paid-downloads-front.js?ver=

HTML / DOM Fingerprints

CSS Classes
pd-add-file-formpd-delete-file-formpd-download-linkpd-file-downloadpd-file-listpd-file-titlepd-file-pricepd-files-container+81 more
HTML Comments
<!-- Paid Downloads Add File Form --><!-- Paid Downloads Edit File Form --><!-- Paid Downloads Delete File Form --><!-- Paid Downloads File List -->+7 more
Data Attributes
data-file-iddata-download-keydata-product-id
JS Globals
paiddownloads_ajax_objectpaiddownloads_ajax_object.ajax_urlpaiddownloads_ajax_object.security
Shortcode Output
[paid-downloads][paiddownloads]
FAQ

Frequently Asked Questions about Paid Downloads