Pay with Code Security & Risk Analysis

wordpress.org/plugins/pay-with-code

The 'Pay with Code' plugin lets customers pay using a pre-purchased code in WooCommerce.

0 active installs v1.0 PHP 7.4+ WP 5.0+ Updated Aug 12, 2024
extensiongatewaypaymentsecure-checkoutwoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Pay with Code Safe to Use in 2026?

Generally Safe

Score 92/100

Pay with Code has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The 'pay-with-code' v1.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of known vulnerabilities and CVEs is a significant positive indicator. The code demonstrates good practices by using prepared statements for all SQL queries and a high percentage of properly escaped output, which helps mitigate common injection and XSS vulnerabilities. The limited attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected is commendable. However, the lack of capability checks across the entire plugin is a notable concern, as it implies that sensitive operations, if any were present, might not be properly restricted to authorized users. While no critical taint flows were identified, the analysis of only two flows is a very small sample size, making it difficult to definitively conclude the absence of all taint-related risks. The presence of nonce checks (4) suggests some attempt at mitigating CSRF, but their effectiveness and coverage are unknown without further context.

Despite the positive aspects, the primary concern stems from the complete absence of capability checks. This could leave the plugin vulnerable if any functionalities were later added or intended for specific user roles. The minimal taint flow analysis also leaves room for potential undiscovered risks. While the plugin has no documented vulnerability history, this could simply mean it's a new or less scrutinized plugin, rather than inherently flawless. The plugin shows a commitment to secure coding principles with its SQL and output escaping practices, but the lack of role-based access control is a gap that needs attention. The overall security is good, but not perfect, with specific areas for improvement.

Key Concerns

  • No capability checks detected
  • Low taint flow analysis coverage
Vulnerabilities
None known

Pay with Code Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Pay with Code Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Pay with Code Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
76 escaped
Nonce Checks
4
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

84% escaped90 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
pwcp_generate_page (pay-with-code.php:417)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Pay with Code Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_enqueue_scriptspay-with-code.php:42
actionadmin_enqueue_scriptspay-with-code.php:59
actionadmin_initpay-with-code.php:63
actionplugins_loadedpay-with-code.php:87
actionwp_enqueue_scriptspay-with-code.php:312
filterwoocommerce_payment_gatewayspay-with-code.php:320
actionadmin_menupay-with-code.php:323
Maintenance & Trust

Pay with Code Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedAug 12, 2024
PHP min version7.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Pay with Code Developer Profile

dynahsty

2 plugins · 0 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Pay with Code

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pay-with-code/pay-css/pwcp-settings.css/wp-content/plugins/pay-with-code/pay-css/pwcp-generate.css/wp-content/plugins/pay-with-code/pay-css/pwcp-logs.css/wp-content/plugins/pay-with-code/pay-css/pwcp-donation.css/wp-content/plugins/pay-with-code/pay-css/pwcp-clear-codes.css
Script Paths
/wp-content/plugins/pay-with-code/pay-js/pwcp-admin.js
Version Parameters
pay-with-code/pay-css/pwcp-settings.css?ver=pay-with-code/pay-css/pwcp-generate.css?ver=pay-with-code/pay-css/pwcp-logs.css?ver=pay-with-code/pay-css/pwcp-donation.css?ver=pay-with-code/pay-css/pwcp-clear-codes.css?ver=pay-with-code/pay-js/pwcp-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
pwcp-settings-csspwcp-generate-csspwcp-logs-csspwcp-donation-csspwcp-clear-codes-css
Data Attributes
data-generated_codes
JS Globals
pwcpData
FAQ

Frequently Asked Questions about Pay with Code