Bluesnap for WordPress Security & Risk Analysis

wordpress.org/plugins/plimus-for-wordpress

Plimus for WordPress allows seamless Bluesnap Payment Gateway IPN integration for WordPress blogs.

10 active installs v1.1.3 PHP + WP 2.8+ Updated Unknown
adminipnpaymentplimusplimus-ipn
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Bluesnap for WordPress Safe to Use in 2026?

Generally Safe

Score 100/100

Bluesnap for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The security posture of the "plimus-for-wordpress" v1.1.3 plugin presents a mixed bag of good practices and significant concerns. On the positive side, the plugin has no known CVEs, indicating a relatively clean history. Furthermore, its limited attack surface with zero AJAX handlers, REST API routes, shortcodes, or cron events that are accessible without authentication is a strong point. The absence of external HTTP requests and a focus on file operations rather than direct user interaction in those areas can also be seen as positive security considerations.

However, the static analysis reveals critical areas of weakness. The most concerning finding is that 0% of the 30 total outputs are properly escaped. This opens the door to potential cross-site scripting (XSS) vulnerabilities, where malicious code could be injected and executed in users' browsers. Additionally, while 44% of SQL queries use prepared statements, a significant portion still does not, posing a risk of SQL injection if these queries handle user-supplied input without proper sanitization. The presence of 3 taint flows with unsanitized paths, even without a critical or high severity classification, suggests potential pathways for data to be misused or lead to unexpected behavior.

The lack of nonce checks and capability checks, combined with the absence of authentication on any identified entry points (even though the number of entry points is zero), suggests a potential oversight in securing actions that might be triggered indirectly. The use of a very outdated jQuery v1.4.3 library is another significant concern, as older library versions are often known to contain security vulnerabilities that have since been patched in newer releases. In conclusion, while the plugin avoids common pitfalls like numerous unauthenticated entry points or known CVEs, the severe lack of output escaping, potential for SQL injection, and outdated bundled library present substantial security risks that require immediate attention.

Key Concerns

  • Outputs are not properly escaped
  • SQL queries are not always prepared
  • Taint flows with unsanitized paths
  • Bundled outdated library (jQuery v1.4.3)
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Bluesnap for WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Bluesnap for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
5
4 prepared
Unescaped Output
30
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
6
External Requests
0
Bundled Libraries
1

Bundled Libraries

jQuery1.4.3

SQL Query Safety

44% prepared9 total queries

Output Escaping

0% escaped30 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
pn_handle_pdf_page (plimus-pn.php:59)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Bluesnap for WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_print_stylesplimus-pn.php:638
actionadmin_menuplimus-pn.php:639
actionadmin_print_scriptsplimus-pn.php:640
Maintenance & Trust

Bluesnap for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedUnknown
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Bluesnap for WordPress Developer Profile

Vladimir Prelovac

20 plugins · 1.0M total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
2577 days
View full developer profile
Detection Fingerprints

How We Detect Bluesnap for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/plimus-for-wordpress/images/plimus_logo.png/wp-content/plugins/plimus-for-wordpress/images/pn_plugin_icon.png

HTML / DOM Fingerprints

CSS Classes
plimus-logo
Data Attributes
id="plimus-logo"
FAQ

Frequently Asked Questions about Bluesnap for WordPress