Paypal.me – An offline payment gateway Security & Risk Analysis

wordpress.org/plugins/payment-gateway-paypalme

Get payment using your PayPal.Me link or PayPal Email from your website.

200 active installs v1.0.0 PHP + WP 3.5+ Updated Jan 11, 2017
paymentpaypalpaypal-gatewaypaypal-mepaypal-me-gateway
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Paypal.me – An offline payment gateway Safe to Use in 2026?

Generally Safe

Score 85/100

Paypal.me – An offline payment gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The static analysis of the 'payment-gateway-paypalme' plugin v1.0.0 reveals a promisingly small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. This indicates a potentially well-contained plugin. Furthermore, the absence of dangerous function calls, file operations, external HTTP requests, and the use of prepared statements for all SQL queries are strong security indicators. However, a critical weakness is the complete lack of output escaping, meaning any dynamic data displayed to users could be vulnerable to cross-site scripting (XSS) attacks. The absence of nonce and capability checks on any potential entry points (though none were identified) is also a concern, as it suggests a lack of robust authorization and input validation mechanisms if new entry points were to be introduced or discovered.

The vulnerability history is clean, with no known CVEs and no previously recorded vulnerability types. This is a positive sign, suggesting a history of secure development or a lack of historical scrutiny. However, the lack of previous vulnerabilities does not guarantee future security. The most significant risk stemming from the static analysis is the unescaped output. While the attack surface is currently zero, the lack of output escaping creates a latent vulnerability that could be exploited if any data is ever displayed to the user without proper sanitization. This makes the plugin's current state somewhat fragile despite the lack of known issues.

Key Concerns

  • No output escaping found
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

Paypal.me – An offline payment gateway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Paypal.me – An offline payment gateway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Attack Surface

Paypal.me – An offline payment gateway Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedpayment-gateway-paypal.me.php:15
actionwoocommerce_update_options_payment_gatewayspayment-gateway-paypal.me.php:46
actionwoocommerce_thankyoupayment-gateway-paypal.me.php:47
actionwoocommerce_email_before_order_tablepayment-gateway-paypal.me.php:50
filterwoocommerce_payment_gatewayspayment-gateway-paypal.me.php:186
Maintenance & Trust

Paypal.me – An offline payment gateway Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedJan 11, 2017
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings3
Active installs200
Developer Profile

Paypal.me – An offline payment gateway Developer Profile

smart

2 plugins · 280 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Paypal.me – An offline payment gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
paypal_me_wrapperpaypal_me_classpaypalme__span
Data Attributes
id='paypalme_button_id'
FAQ

Frequently Asked Questions about Paypal.me – An offline payment gateway