
Paid Downloads Security & Risk Analysis
wordpress.org/plugins/paid-downloadsThe plugin allows to sell digital content and accept payments via PayPal, Payza or InterKassa. It delivers download link after completed payment.
Is Paid Downloads Safe to Use in 2026?
Use With Caution
Score 60/100Paid Downloads has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The "paid-downloads" plugin v3.15 presents a mixed security posture. While it demonstrates good practices in minimizing its attack surface with no unprotected AJAX handlers or REST API routes, and a relatively low number of total entry points, several concerning code signals and taint analysis results highlight potential weaknesses. The significant number of SQL queries, with a substantial portion not using prepared statements, combined with a high number of taint flows with unsanitized paths (8 critically flagged), strongly suggests a risk of SQL injection vulnerabilities. The plugin's vulnerability history, which includes one known high-severity CVE specifically related to SQL Injection and a recent vulnerability disclosure, further reinforces this concern. The complete lack of nonce checks and limited capability checks, despite the presence of file operations and external HTTP requests, also represents a potential avenue for exploitation if these entry points are not properly secured. Therefore, while the plugin has some strengths in limiting immediate attack vectors, the underlying code quality issues and historical vulnerability patterns point to a moderate to high-risk profile, requiring prompt attention and remediation.
Key Concerns
- High severity taint flows with unsanitized paths
- Unpatched high severity CVE
- SQL queries not using prepared statements
- Lack of nonce checks
- Low percentage of properly escaped output
- Limited capability checks
Paid Downloads Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Paid Downloads <= 3.15 - Unauthenticated SQL Injection
Paid Downloads Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Paid Downloads Attack Surface
Shortcodes 2
WordPress Hooks 8
Maintenance & Trust
Paid Downloads Maintenance & Trust
Maintenance Signals
Community Trust
Paid Downloads Alternatives
WP Express Checkout (Fast Payments via PayPal & Stripe)
wp-express-checkout
Allows you to accept fast and secure payments for products and services via a payment popup window, supporting both the new PayPal and Stripe Checkout …
Payhip – Sell Downloads
payhip-sell-ebooks
This plugin will allow you to Sell Downloads directly to your customers. Sell your eBooks, music, videos, design assets, courses, software and more.
SellApp
sellapp
Accept various payment methods including crypto, paypal, and more.
EasySell
easysell
EasySell is simple and light-weight express sell/checkout plugin where you can sell using Paypal or offline payment. Easy setup in less than 5 mins.
Music Seller
music-seller
This plugin will allow you to sell music in various formats like mp3, ogg and etc.
Paid Downloads Developer Profile
7 plugins · 330 total installs
How We Detect Paid Downloads
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/paid-downloads/css/paid-downloads-admin.css/wp-content/plugins/paid-downloads/css/paid-downloads-front.css/wp-content/plugins/paid-downloads/js/paid-downloads-admin.js/wp-content/plugins/paid-downloads/js/paid-downloads-front.js/wp-content/plugins/paid-downloads/js/paid-downloads-admin.js/wp-content/plugins/paid-downloads/js/paid-downloads-front.jspaid-downloads/css/paid-downloads-admin.css?ver=paid-downloads/css/paid-downloads-front.css?ver=paid-downloads/js/paid-downloads-admin.js?ver=paid-downloads/js/paid-downloads-front.js?ver=HTML / DOM Fingerprints
pd-add-file-formpd-delete-file-formpd-download-linkpd-file-downloadpd-file-listpd-file-titlepd-file-pricepd-files-container+81 more<!-- Paid Downloads Add File Form --><!-- Paid Downloads Edit File Form --><!-- Paid Downloads Delete File Form --><!-- Paid Downloads File List -->+7 moredata-file-iddata-download-keydata-product-idpaiddownloads_ajax_objectpaiddownloads_ajax_object.ajax_urlpaiddownloads_ajax_object.security[paid-downloads][paiddownloads]