Payment Options per Product Security & Risk Analysis

wordpress.org/plugins/payment-options-per-product

Enables the choice of payment options per product.

10 active installs v1.0.3 PHP + WP 3.7.0+ Updated May 29, 2017
idealincassopayment-gatewaysepa-direct-debitsepa-incasso
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Payment Options per Product Safe to Use in 2026?

Generally Safe

Score 85/100

Payment Options per Product has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "payment-options-per-product" v1.0.3 plugin exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The absence of identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. Furthermore, the code signals indicate a cautious approach to SQL queries, with 100% using prepared statements, and no file operations or external HTTP requests were detected. However, the analysis does raise a few points of concern. The presence of two output instances with only 50% properly escaped is a minor weakness, as it could potentially lead to cross-site scripting (XSS) vulnerabilities if the unescaped output contains user-controlled data. The complete lack of nonce checks and capability checks across all entry points (though the attack surface is currently zero) suggests a potential future risk if new entry points are introduced without adequate security measures. The plugin's vulnerability history is clean, with no known CVEs, which is a positive indicator. Overall, the plugin appears to be developed with security in mind, but the minor unescaped output and the absence of general security checks on entry points warrant attention for future development.

Key Concerns

  • Unescaped output detected
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Payment Options per Product Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Payment Options per Product Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped2 total outputs
Attack Surface

Payment Options per Product Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadd_meta_boxespayment-options-per-product.php:77
actionsave_postpayment-options-per-product.php:107
filterwoocommerce_available_payment_gatewayspayment-options-per-product.php:136
Maintenance & Trust

Payment Options per Product Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedMay 29, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Payment Options per Product Developer Profile

PayIBAN BV

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Payment Options per Product

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
id="gateway_paypal"id="gateway_stripe"id="gateway_banktransfer"id="gateway_cheque"id="gateway_cod"id="gateway_bacs"+4 more
FAQ

Frequently Asked Questions about Payment Options per Product