Podamibe 2Checkout Security & Risk Analysis

wordpress.org/plugins/podamibe-2checkout

A perfect plugin for online payment using 2Checkout.

10 active installs v1.0.3 PHP + WP 3.0+ Updated May 22, 2019
2checkout2checkout-payment-gatewayeasy-payment-gatewayonline-payment-gatewaypayment-gateway
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Podamibe 2Checkout Safe to Use in 2026?

Generally Safe

Score 85/100

Podamibe 2Checkout has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "podamibe-2checkout" plugin v1.0.3 presents a mixed security posture. On the positive side, it has no recorded vulnerabilities and a clean taint analysis, indicating no obvious critical or high-severity injection flaws in the analyzed flows. The absence of dangerous functions and external HTTP requests is also a good sign. However, significant concerns arise from the static analysis. The plugin exposes two AJAX handlers without any authentication or capability checks, creating a substantial attack surface that could be exploited by unauthenticated users. Furthermore, while there are nonce checks, their implementation or effectiveness across all entry points isn't fully guaranteed by the provided data. The lack of capability checks on AJAX endpoints is a direct and serious risk.

While the plugin has no known CVEs and its vulnerability history is clean, this does not negate the risks identified in the static analysis. A clean history can sometimes be attributed to a lack of targeted analysis or public disclosure rather than inherent security. The critical weakness here is the direct exposure of AJAX endpoints. The raw SQL query without prepared statements is another concern, although its impact is reduced given the absence of exploitable taint flows. The low percentage of properly escaped output is also a potential issue, increasing the risk of cross-site scripting (XSS) vulnerabilities, though specific exploitable flows were not identified in the taint analysis.

Overall, the plugin exhibits a concerning lack of robust access control on its entry points, particularly AJAX handlers. The absence of capability checks on these endpoints is a significant security gap that could lead to unauthorized actions. While the vulnerability history is reassuring, the identified static analysis issues, especially the unprotected AJAX handlers and a high proportion of unescaped output, demand immediate attention. Mitigation strategies should focus on implementing proper nonce and capability checks for all AJAX requests and improving output sanitization.

Key Concerns

  • AJAX handlers without auth checks
  • SQL queries without prepared statements
  • Low percentage of properly escaped output
  • AJAX handlers without capability checks
Vulnerabilities
None known

Podamibe 2Checkout Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Podamibe 2Checkout Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
53
23 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

30% escaped76 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
create (inc\backend\class-ptc-main-page.php:183)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Podamibe 2Checkout Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

authwp_ajax_ptc_form_validationinc\functions.php:102
noprivwp_ajax_ptc_form_validationinc\functions.php:103

Shortcodes 1

[P2Checkout] inc\frontend\ptc-shortcode.php:20
WordPress Hooks 8
actioninit2checkout.php:58
actionadmin_menu2checkout.php:60
actionadmin_enqueue_scripts2checkout.php:61
actionwp_enqueue_scripts2checkout.php:62
actionafter_setup_theme2checkout.php:64
filterplugin_row_meta2checkout.php:67
filterptc_validation_rulesinc\functions.php:111
filterptc_validation_rulesinc\functions.php:115
Maintenance & Trust

Podamibe 2Checkout Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedMay 22, 2019
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Podamibe 2Checkout Developer Profile

Podamibe Nepal

8 plugins · 6K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Podamibe 2Checkout

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/podamibe-2checkout/css/backend.css/wp-content/plugins/podamibe-2checkout/js/backend.js/wp-content/plugins/podamibe-2checkout/css/frontend.css/wp-content/plugins/podamibe-2checkout/js/2co.min.js/wp-content/plugins/podamibe-2checkout/js/frontend.js
Version Parameters
podamibe-2checkout/css/backend.css?ver=podamibe-2checkout/js/backend.js?ver=podamibe-2checkout/css/frontend.css?ver=podamibe-2checkout/js/2co.min.js?ver=podamibe-2checkout/js/frontend.js?ver=

HTML / DOM Fingerprints

JS Globals
ptc_script_variable
FAQ

Frequently Asked Questions about Podamibe 2Checkout