Payments for Hubtel Security & Risk Analysis

wordpress.org/plugins/payments-hubtel

Accept payments on your WooCommerce powered website directly to your Hubtel account.

100 active installs v1.0.1 PHP 7.4+ WP 6.3+ Updated Oct 29, 2025
ghanahubtelmobile-moneyvisawoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Payments for Hubtel Safe to Use in 2026?

Generally Safe

Score 100/100

Payments for Hubtel has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The "payments-hubtel" plugin version 1.0.1 exhibits a generally good security posture with no known vulnerabilities in its history and a lack of critical or high severity issues identified in the static analysis. The code demonstrates adherence to several security best practices, including 100% proper output escaping and the use of prepared statements for all SQL queries, which significantly mitigates risks associated with common database vulnerabilities.

However, there are notable areas of concern. The static analysis reveals a complete absence of nonce checks and capability checks. While the attack surface appears small (0 unprotected entry points), this lack of authorization checks on potential input sources is a significant weakness. Furthermore, the taint analysis indicates two flows with unsanitized paths, even though they are not classified as critical or high severity. The presence of file operations and external HTTP requests also necessitates careful scrutiny to ensure these operations are not exploitable, especially without the safety net of nonce and capability checks. The plugin's vulnerability history being empty is positive, but it does not excuse the lack of fundamental security checks.

In conclusion, while "payments-hubtel" v1.0.1 benefits from good practices in data output and database interaction, the complete omission of nonce and capability checks presents a considerable risk. The unsanitized paths, though not flagged as high severity, also warrant attention. Developers should prioritize implementing robust authorization checks for all user-facing functionalities and thoroughly audit the identified unsanitized paths to ensure no exploitable vulnerabilities exist.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Flows with unsanitized paths
Vulnerabilities
None known

Payments for Hubtel Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Payments for Hubtel Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
4
Bundled Libraries
0

Output Escaping

100% escaped3 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
direct_feedback (includes\hubtel-gateway.php:324)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Payments for Hubtel Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionwoocommerce_api_hubtel_gatewayincludes\hubtel-gateway.php:54
actionwoocommerce_api_hubtel_gateway_delayedincludes\hubtel-gateway.php:55
actionwoocommerce_before_thankyouincludes\hubtel-gateway.php:56
actionadmin_enqueue_scriptsincludes\hubtel-gateway.php:57
actionplugins_loadedpayments-hubtel.php:43
filterwoocommerce_payment_gatewayspayments-hubtel.php:46
actionwoocommerce_blocks_loadedpayments-hubtel.php:49
filterplugin_action_linkspayments-hubtel.php:51
actionwoocommerce_blocks_payment_method_type_registrationpayments-hubtel.php:126
Maintenance & Trust

Payments for Hubtel Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedOct 29, 2025
PHP min version7.4
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Payments for Hubtel Developer Profile

Kwame Twum

1 plugin · 100 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Payments for Hubtel

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/payments-hubtel/assets/hubtel.png
Version Parameters
payments-hubtel/includes/hubtel-gateway.php?ver=

HTML / DOM Fingerprints

CSS Classes
wc_payment_method_hubtel
HTML Comments
<!-- Hubtel Payment gateway plugin class. -->
Data Attributes
data-hubtel-client-iddata-hubtel-modedata-hubtel-mobile-number
JS Globals
window.HubtelGateway
REST Endpoints
/wp-json/payments-hubtel/v1/payment/process
FAQ

Frequently Asked Questions about Payments for Hubtel