PayHere Payment Gateway – Beta Security & Risk Analysis

wordpress.org/plugins/payhere-payment-gateway-beta

PayHere Payment Gateway Plugin for WooCommerce

20 active installs v2.5.3 PHP + WP 6.4+ Updated Jan 22, 2026
onlinepayherepaymentssri-lanka
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is PayHere Payment Gateway – Beta Safe to Use in 2026?

Generally Safe

Score 100/100

PayHere Payment Gateway – Beta has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The plugin "payhere-payment-gateway-beta" v2.5.3 presents a mixed security posture. On the positive side, the static analysis indicates robust practices regarding SQL queries, as all are properly prepared, and a high percentage of output escaping is correctly implemented. The absence of file operations and the lack of recorded historical vulnerabilities are also positive indicators. However, significant concerns arise from the attack surface. The plugin exposes three AJAX handlers, all of which lack authentication checks. This is a critical oversight that could allow unauthenticated users to trigger potentially sensitive actions. Furthermore, the complete absence of nonce checks on these AJAX actions exacerbates this risk, making them vulnerable to Cross-Site Request Forgery (CSRF) attacks.

The taint analysis did not reveal any specific vulnerabilities, which is a positive sign. However, the lack of analysis flows suggests that either the analysis was incomplete or the plugin's code paths are not complex enough to trigger the taint analysis tool. The plugin's history of zero known CVEs is encouraging, suggesting a history of secure development or limited exposure. Despite the positive aspects of data handling and the clean vulnerability history, the unprotected AJAX endpoints represent a substantial security risk that needs immediate attention.

Key Concerns

  • AJAX handlers without authentication checks
  • No nonce checks on AJAX handlers
  • Large attack surface without authorization
Vulnerabilities
None known

PayHere Payment Gateway – Beta Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

PayHere Payment Gateway – Beta Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
7
184 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

96% escaped191 total outputs
Attack Surface
3 unprotected

PayHere Payment Gateway – Beta Attack Surface

Entry Points3
Unprotected3

AJAX Handlers 3

authwp_ajax_payhere_remove_cardincludes\class-payhere.php:228
authwp_ajax_payhere_chargeincludes\class-payhere.php:252
authwp_ajax_payhere_captureincludes\class-payhere.php:253
WordPress Hooks 30
actionbefore_woocommerce_initblock\class-payhere-block-loader.php:26
actionwoocommerce_blocks_payment_method_type_registrationblock\class-payhere-block-loader.php:43
actionwoocommerce_blocks_loadedblock\class-payhere-block-loader.php:52
actionwoocommerce_receipt_payheregateway\class-wcgatewaypayhere.php:212
actionwoocommerce_thankyougateway\class-wcgatewaypayhere.php:213
filterthe_titlegateway\class-wcgatewaypayhere.php:216
filterwoocommerce_thankyou_order_received_textgateway\class-wcgatewaypayhere.php:218
actionadmin_noticesincludes\class-payhere.php:96
actionadmin_noticesincludes\class-payhere.php:108
actionplugins_loadedincludes\class-payhere.php:183
actionadmin_enqueue_scriptsincludes\class-payhere.php:199
actionadmin_enqueue_scriptsincludes\class-payhere.php:200
filterplugin_action_linksincludes\class-payhere.php:202
actionplugins_loadedincludes\class-payhere.php:204
actioninitincludes\class-payhere.php:220
filterquery_varsincludes\class-payhere.php:222
filterwoocommerce_account_menu_itemsincludes\class-payhere.php:223
actionwoocommerce_account_saved-cards_endpointincludes\class-payhere.php:224
actionwp_enqueue_scriptsincludes\class-payhere.php:226
actionwp_enqueue_scriptsincludes\class-payhere.php:227
actionplugins_loadedincludes\class-payhere.php:243
filterwoocommerce_payment_gatewaysincludes\class-payhere.php:245
filterwoocommerce_register_shop_order_post_statusesincludes\class-payhere.php:246
filterwc_order_statusesincludes\class-payhere.php:248
filterwc_order_is_editableincludes\class-payhere.php:250
actionadd_meta_boxesincludes\class-payhere.php:254
filterwcs_view_subscription_actionsincludes\class-payhere.php:256
filteruser_has_capincludes\class-payhere.php:257
actionadmin_menuincludes\class-phcustomerlistoptions.php:40
actionplugins_loadedpayhere-payment-gateway-beta.php:86
Maintenance & Trust

PayHere Payment Gateway – Beta Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 22, 2026
PHP min version
Downloads737

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

PayHere Payment Gateway – Beta Developer Profile

PayHere

2 plugins · 2K total installs

87
trust score
Avg Security Score
99/100
Avg Patch Time
36 days
View full developer profile
Detection Fingerprints

How We Detect PayHere Payment Gateway – Beta

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/payhere-payment-gateway-beta/admin/css/payhere-ipg-admin.css/wp-content/plugins/payhere-payment-gateway-beta/admin/css/payhere-customer-list-settings.css
Version Parameters
payhere-payment-gateway-beta/admin/css/payhere-ipg-admin.css?ver=payhere-payment-gateway-beta/admin/css/payhere-customer-list-settings.css?ver=

HTML / DOM Fingerprints

CSS Classes
image-selection-wrapperadd-mediaremove-mediaset-default
HTML Comments
Currently plugin version.The code that runs during plugin activation.The code that runs during plugin deactivation.Add function to remove old transaction logs.+12 more
Data Attributes
image-selection-wrapperadd-mediaremove-mediaset-default
FAQ

Frequently Asked Questions about PayHere Payment Gateway – Beta