
Pay with ConnectIPS Security & Risk Analysis
wordpress.org/plugins/pay-with-connectipsEnhance your WooCommerce store's payment options with the Pay with ConnectIPS Payment Gateway plugin.
Is Pay with ConnectIPS Safe to Use in 2026?
Generally Safe
Score 100/100Pay with ConnectIPS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "pay-with-connectips" v1.0.3 plugin exhibits a mixed security posture. On the positive side, there are no known CVEs associated with this plugin, and the static analysis reveals a low attack surface with no registered AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code demonstrates good practices in SQL query handling, with 100% of queries using prepared statements, and a high rate of output escaping (91%).
However, significant concerns arise from the taint analysis and code signals. The presence of two taint flows with unsanitized paths, even without critical or high severity, indicates potential pathways for malicious input to be processed insecurely. Compounding this, the lack of nonce checks and capability checks, particularly concerning given the absence of an explicit entry point analysis, suggests that any newly discovered or introduced vulnerabilities could be easier to exploit. The single file operation and single external HTTP request also represent potential, albeit limited, points of interest for attackers if not handled with extreme care.
While the plugin's history is clean, this should not be interpreted as a guarantee of future security. The identified taint flows and the absence of fundamental security checks like nonces and capability checks are more indicative of potential weaknesses than the clean CVE history is of absolute strength. The plugin's strengths lie in its limited attack surface and good SQL practices, but these are overshadowed by the potential for unsanitized data processing and a lack of protective measures against common web vulnerabilities.
Key Concerns
- Taint flows with unsanitized paths
- No nonce checks
- No capability checks
- File operations found
- External HTTP requests found
- Output escaping not 100%
Pay with ConnectIPS Security Vulnerabilities
Pay with ConnectIPS Code Analysis
Output Escaping
Data Flow Analysis
Pay with ConnectIPS Attack Surface
WordPress Hooks 13
Maintenance & Trust
Pay with ConnectIPS Maintenance & Trust
Maintenance Signals
Community Trust
Pay with ConnectIPS Alternatives
Paystack WooCommerce Payment Gateway
woo-paystack
Paystack for WooCommerce allows your WooCommerce store to accept secure payments from multiple local and global payment channels.
Montonio for WooCommerce
montonio-for-woocommerce
Montonio is a complete checkout solution for online stores that includes all popular payment methods (local banks, card payments, Apple Pay, Google Pa …
NETOPIA Payments Payment Gateway
netopia-payments-payment-gateway
NETOPIA Payments Payment Gateway extends WooCommerce payment options by adding NETOPIA's Payment Gateway options.
SumUp Payment Gateway For WooCommerce
sumup-payment-gateway-for-woocommerce
The SumUp plugin for WooCommerce allows businesses to securely process payments online. Accept payments from customers using a range of payment method …
Pledged Plugins Secure Gateway for Authorize.net and WooCommerce
woo-authorize-net-gateway-aim
Authorize.net payment gateway integration for WooCommerce to accept credit cards directly on WordPress e-commerce websites.
Pay with ConnectIPS Developer Profile
15 plugins · 2K total installs
How We Detect Pay with ConnectIPS
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/pay-with-connectips/assets/pay-with-connectips/style.css?ver=pay-with-connectips/script.js?ver=HTML / DOM Fingerprints
connectIPS-form-buttondata-copy_valueconnectips-custom-form-submissionconnectips-copy-button/wp-json/connectips-failure/wp-json/connectips-success