Payza Payments Security & Risk Analysis

wordpress.org/plugins/payza-payments

Easy integration of Payza payments / AlertPay payments to your WordPres powered blog. You can configure all options on WP Admin interface.

10 active installs v1.0 PHP + WP 3.0.0+ Updated Nov 7, 2012
alertpaybuy-nowintegrate-payzapaymentspayza
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Payza Payments Safe to Use in 2026?

Generally Safe

Score 85/100

Payza Payments has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "payza-payments" plugin v1.0 exhibits a mixed security posture. On the positive side, all detected SQL queries utilize prepared statements, and there are no known vulnerabilities (CVEs) associated with this plugin, suggesting a history of secure development or prompt patching. The attack surface is minimal, with only one shortcode and no exposed AJAX handlers or REST API routes without authentication. The absence of dangerous functions and file operations is also a good sign.

However, significant concerns arise from the output escaping and taint analysis. A concerning 0% of output is properly escaped, which poses a high risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis reveals two flows with unsanitized paths, indicating potential for unauthorized access or data manipulation, although they are not categorized as critical or high severity. Furthermore, the complete lack of nonce checks and capability checks, especially with the presence of a shortcode, means that actions triggered by the shortcode might be susceptible to CSRF attacks and executed by users without the intended privileges.

In conclusion, while the plugin benefits from a small attack surface and secure database interaction, the pervasive issue with output escaping and the presence of unsanitized paths are critical weaknesses that must be addressed. The lack of nonce and capability checks further amplifies these risks. The absence of known CVEs is positive, but the identified code quality issues present immediate potential threats.

Key Concerns

  • 0% output properly escaped
  • Taint flow with unsanitized path (2 total)
  • 0 Nonce checks
  • 0 Capability checks
Vulnerabilities
None known

Payza Payments Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Payza Payments Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
46
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

0% escaped46 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
adminConfiguration (classes\payza-admin.php:19)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Payza Payments Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[payza] payza-payments.php:54
WordPress Hooks 1
actionadmin_menupayza-payments.php:49
Maintenance & Trust

Payza Payments Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedNov 7, 2012
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Payza Payments Developer Profile

hccoder

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Payza Payments

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/payza-payments/static/images/icon.png
Version Parameters
payza-payments/static/images/icon.png?ver=

HTML / DOM Fingerprints

Shortcode Output
<form method="post" action="https://secure.payza.com/paynow/" accept-charset="utf-8">
FAQ

Frequently Asked Questions about Payza Payments