
Autopay Security & Risk Analysis
wordpress.org/plugins/platnosci-online-blue-mediaAutopay is a payment module that enables cashless transactions in a shop based on the WordPress platform (WooCommerce).
Is Autopay Safe to Use in 2026?
Generally Safe
Score 100/100Autopay has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin "platnosci-online-blue-media" v4.8.3 demonstrates a generally good security posture in several key areas. The absence of any known CVEs and a clean vulnerability history are significant strengths, suggesting a commitment to security or a lack of significant past issues. The static analysis also shows a low attack surface, with no unprotected AJAX handlers, REST API routes, or shortcodes. Furthermore, the majority of SQL queries utilize prepared statements, and a good percentage of output is properly escaped. The presence of nonce checks also indicates an awareness of common WordPress vulnerabilities.
However, there are specific areas of concern. The taint analysis revealed two high-severity flows with unsanitized paths, which could potentially lead to path traversal or other file system related vulnerabilities if exploited. Although the total number of file operations is low, these unsanitized paths represent a critical risk. The plugin also lacks capability checks on its entry points, meaning that any authenticated user, regardless of their role, could potentially interact with these features, which could be problematic depending on the functionality. The presence of bundled libraries, while not inherently a risk, requires careful management to ensure they are up-to-date and free from known vulnerabilities.
In conclusion, the plugin has a solid foundation with a clean history and a well-managed attack surface. Nevertheless, the high-severity taint flows and the absence of capability checks on entry points introduce notable risks that should be addressed. Proactive monitoring of bundled libraries for security updates is also advisable.
Key Concerns
- High severity taint flows
- Unsanitized paths in taint flows
- Missing capability checks
- Bundled libraries (potential risk)
Autopay Security Vulnerabilities
Autopay Release Timeline
Autopay Code Analysis
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
Autopay Attack Surface
WordPress Hooks 33
Scheduled Events 1
Maintenance & Trust
Autopay Maintenance & Trust
Maintenance Signals
Community Trust
Autopay Alternatives
Essential Addons for Elementor – Popular Elementor Templates & Widgets
essential-addons-for-elementor-lite
Elementor addon offering 110+ widgets and templates — Elementor Gallery, Slider, Form, Post Grid, Menu, Accordion, WooCommerce & more.
Limit Login Attempts Reloaded – Login Security, 2FA, Brute Force Protection & Firewall
limit-login-attempts-reloaded
Stop password guessing attacks, secure WooCommerce, block bad IPs, block by countries (Pro), and add email 2FA. Lightweight with better performance.
Google for WooCommerce
google-listings-and-ads
Native integration with Google that allows merchants to easily display their products across Google’s network.
WooPayments: Integrated WooCommerce Payments
woocommerce-payments
Securely accept credit and debit cards on your WooCommerce store. Manage payments without leaving your WordPress dashboard. Only with WooPayments.
WooCommerce PayPal Payments
woocommerce-paypal-payments
PayPal's latest payment processing solution. Accept PayPal, Pay Later, credit/debit cards, alternative digital wallets and bank accounts.
Autopay Developer Profile
1 plugin · 3K total installs
How We Detect Autopay
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/platnosci-online-blue-media/assets/js/admin-sortable.jsplatnosci-online-blue-media/assets/js/admin-sortable.js?ver=HTML / DOM Fingerprints
bm-woocommercedata-gateway_id="bluemedia"wp.codeEditor.initializewp.codeEditor.defaultSettings