Pay-To-View Lite Security & Risk Analysis

wordpress.org/plugins/pay-to-view-lite

Monetize your media with pay-per-view. Set pricing, rental length, accept PayPal/cards, log rentals, and publish using shortcodes.

10 active installs v1.2.2 PHP 7.0+ WP 5.0+ Updated Oct 4, 2025
movie-streamingpay-per-viewpay-to-viewpaypalvideo-rental
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Pay-To-View Lite Safe to Use in 2026?

Generally Safe

Score 100/100

Pay-To-View Lite has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6mo ago
Risk Assessment

The "pay-to-view-lite" plugin v1.2.2 exhibits a generally good security posture based on the provided static analysis and vulnerability history. The absence of any recorded CVEs, unpatched vulnerabilities, or common vulnerability types is a strong indicator of responsible development and maintenance. The code analysis reveals a limited attack surface with all identified entry points (AJAX handlers and shortcodes) seemingly protected by authentication or capability checks, although the explicit absence of capability checks is noted as a potential concern.

The static analysis highlights several positive security practices. The plugin uses prepared statements exclusively for SQL queries, significantly mitigating SQL injection risks. A high percentage of output escaping (95%) further reduces the likelihood of cross-site scripting (XSS) vulnerabilities. The presence of a nonce check on at least one entry point is also a positive sign.

However, there are areas for improvement. The absence of explicit capability checks on the AJAX handlers, despite an entry point being present, is a notable concern. While the overall output escaping is high, the remaining 7% of unescaped outputs could still pose a risk. The plugin also performs file operations, and without further details, it's difficult to fully assess the risk associated with these operations. The lack of taint analysis results (0 flows analyzed) means that potential vulnerabilities involving the sanitization of user-supplied data might have been missed.

In conclusion, "pay-to-view-lite" v1.2.2 appears to be a reasonably secure plugin with a clean vulnerability history. The developers have implemented good practices like prepared statements and high output escaping. The primary areas of concern revolve around the potential for missing capability checks on AJAX handlers, the small percentage of unescaped output, and the unknown security implications of file operations and the lack of taint analysis.

Key Concerns

  • Capability checks absent on AJAX handlers
  • Minor unescaped output exists
  • Taint analysis not performed
Vulnerabilities
None known

Pay-To-View Lite Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Pay-To-View Lite Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
98 escaped
Nonce Checks
1
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

95% escaped103 total outputs
Attack Surface

Pay-To-View Lite Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 2

authwp_ajax_paytoviewlite_log_rentalpay-to-view-lite.php:196
noprivwp_ajax_paytoviewlite_log_rentalpay-to-view-lite.php:197

Shortcodes 1

[paytoviewlite] pay-to-view-lite.php:193
WordPress Hooks 8
actionadmin_menupay-to-view-lite.php:181
actionadmin_initpay-to-view-lite.php:182
actionadmin_enqueue_scriptspay-to-view-lite.php:183
actionadmin_enqueue_scriptspay-to-view-lite.php:184
actionadmin_enqueue_scriptspay-to-view-lite.php:185
actionwp_enqueue_scriptspay-to-view-lite.php:188
actionwp_enqueue_scriptspay-to-view-lite.php:189
actionwp_footerpay-to-view-lite.php:190
Maintenance & Trust

Pay-To-View Lite Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedOct 4, 2025
PHP min version7.0
Downloads474

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Pay-To-View Lite Developer Profile

Lise Rasmussen

2 plugins · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Pay-To-View Lite

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pay-to-view-lite/assets/css/frontend-styles.css/wp-content/plugins/pay-to-view-lite/assets/js/frontend.js/wp-content/plugins/pay-to-view-lite/assets/css/admin-styles.css/wp-content/plugins/pay-to-view-lite/assets/js/admin.js/wp-content/plugins/pay-to-view-lite/assets/css/paytoview.css
Script Paths
https://www.paypal.com/sdk/js?client-id=https://www.paypal.com/sdk/js?client-id=&currency=
Version Parameters
pay-to-view-lite/assets/css/frontend-styles.css?ver=pay-to-view-lite/assets/js/frontend.js?ver=pay-to-view-lite/assets/css/admin-styles.css?ver=pay-to-view-lite/assets/js/admin.js?ver=pay-to-view-lite/assets/css/paytoview.css?ver=

HTML / DOM Fingerprints

CSS Classes
tooltip-containerinfo-icontooltip-text
Data Attributes
aria-label
JS Globals
window.paytoviewLiteItems
Shortcode Output
[paytoviewlite]
FAQ

Frequently Asked Questions about Pay-To-View Lite