Pelcro: Content Subscription Platform Security & Risk Analysis

wordpress.org/plugins/pay-to-view

The #1 Content Subscription Platform. All the tools you need to drive subscription revenue from your audience. Setup a membership paywall in minutes.

10 active installs v3.0.4 PHP + WP 3.0+ Updated Apr 17, 2018
contentmembershippaywallpelcrosubscription
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Pelcro: Content Subscription Platform Safe to Use in 2026?

Generally Safe

Score 85/100

Pelcro: Content Subscription Platform has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The static analysis of the 'pay-to-view' plugin v3.0.4 reveals a seemingly good security posture with no identified entry points (AJAX handlers, REST API routes, shortcodes, cron events) lacking authentication or proper permission checks. The code also demonstrates positive practices by using prepared statements for all SQL queries and avoiding dangerous functions, file operations, and external HTTP requests. However, a significant concern arises from the output escaping. With 50% of outputs not being properly escaped, this presents a potential risk for cross-site scripting (XSS) vulnerabilities, especially if user-supplied data is directly reflected in the output without proper sanitization.

The vulnerability history is clean, with no recorded CVEs. This, coupled with the absence of critical or high-severity taint flows, suggests that the plugin has historically been secure or that vulnerabilities have been promptly addressed. Despite the lack of historical issues, the partial output escaping is a notable weakness that could be exploited. Therefore, while the plugin demonstrates good foundational security practices, the unescaped outputs represent a tangible, albeit potentially low-impact, risk that requires attention. Overall, the plugin shows strengths in its controlled attack surface and data handling but has a clear area for improvement regarding output sanitization.

Key Concerns

  • Unescaped output
Vulnerabilities
None known

Pelcro: Content Subscription Platform Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Pelcro: Content Subscription Platform Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped2 total outputs
Attack Surface

Pelcro: Content Subscription Platform Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuincludes\admin\admin-settings.php:17
actionadmin_initincludes\admin\admin-settings.php:18
actionwp_footerincludes\templates.php:18
actionwp_enqueue_scriptsincludes\templates.php:29
Maintenance & Trust

Pelcro: Content Subscription Platform Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedApr 17, 2018
PHP min version
Downloads6K

Community Trust

Rating80/100
Number of ratings2
Active installs10
Developer Profile

Pelcro: Content Subscription Platform Developer Profile

pelcro

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Pelcro: Content Subscription Platform

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/pay-to-view/includes/admin/admin-handler.php/wp-content/plugins/pay-to-view/includes/functions.php/wp-content/plugins/pay-to-view/includes/templates.php

HTML / DOM Fingerprints

JS Globals
afw.siteid
FAQ

Frequently Asked Questions about Pelcro: Content Subscription Platform