Razorpay Payment Button Plugin Security & Risk Analysis

wordpress.org/plugins/razorpay-payment-button

Start accepting payments on WordPress via credit/debit cards, UPI, wallets and more in less than five minutes. One-time and recurring payments.

2K active installs v2.4.9 PHP + WP + Updated Mar 25, 2025
donate-buttonindiapayment-gatewaypayment-pluginupi-credit-debit-card
91
A · Safe
CVEs total1
Unpatched0
Last CVENov 12, 2024
Safety Verdict

Is Razorpay Payment Button Plugin Safe to Use in 2026?

Generally Safe

Score 91/100

Razorpay Payment Button Plugin has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Nov 12, 2024Updated 1yr ago
Risk Assessment

The "razorpay-payment-button" plugin v2.4.9 exhibits a generally good security posture concerning its attack surface and the use of secure coding practices. The static analysis reveals no AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without proper authentication or permission checks. The code also demonstrates a strong commitment to security by avoiding dangerous functions, using prepared statements for all SQL queries, and handling file operations and external HTTP requests safely. A high percentage of output escaping is also a positive sign. However, the taint analysis indicates a concerning finding: all four analyzed flows had unsanitized paths. While no critical or high-severity vulnerabilities were found in these flows, this suggests a potential weakness in how user-supplied data is handled, which could be exploited in conjunction with other factors to lead to security issues. The plugin's vulnerability history shows one known CVE, categorized as Cross-site Scripting, which has since been patched. This single past vulnerability, especially of a XSS nature, when combined with the taint analysis findings, suggests that while the developers are responsive to patching issues, there might be underlying patterns in input sanitization that warrant closer inspection. Overall, the plugin has a solid foundation with no major immediate threats evident from the provided data, but the unsanitized paths identified in the taint analysis represent a notable area of concern that could be a precursor to future vulnerabilities.

Key Concerns

  • Taint flows with unsanitized paths detected
  • Past Cross-site Scripting (XSS) vulnerability history
Vulnerabilities
1

Razorpay Payment Button Plugin Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-10851medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Razorpay Payment Button <= 2.4.6 - Reflected Cross-Site Scripting

Nov 12, 2024 Patched in 2.4.7 (2d)
Code Analysis
Analyzed Mar 16, 2026

Razorpay Payment Button Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
49 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

83% escaped59 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
process (includes\rzp-btn-action.php:21)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Razorpay Payment Button Plugin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initincludes\rzp-btn-settings.php:10
actionadmin_enqueue_scriptsrazorpay-payment-buttons.php:22
actionadmin_post_rzp_btn_actionrazorpay-payment-buttons.php:23
actionadmin_menurazorpay-payment-buttons.php:68
actionenqueue_block_editor_assetsrazorpay-payment-buttons.php:69
Maintenance & Trust

Razorpay Payment Button Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedMar 25, 2025
PHP min version
Downloads40K

Community Trust

Rating100/100
Number of ratings2
Active installs2K
Developer Profile

Razorpay Payment Button Plugin Developer Profile

Razorpay

10 plugins · 107K total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
22 days
View full developer profile
Detection Fingerprints

How We Detect Razorpay Payment Button Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/razorpay-payment-button/public/css/button.css/wp-content/plugins/razorpay-payment-button/public/css/bootstrap.min.css/wp-content/plugins/razorpay-payment-button/public/js/blocks.js
Script Paths
/wp-content/plugins/razorpay-payment-button/public/js/blocks.js
Version Parameters
razorpay-payment-button/public/css/button.css?ver=razorpay-payment-button/public/css/bootstrap.min.css?ver=razorpay-payment-button/public/js/blocks.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-razorpay-iddata-razorpay-payment-page-id
JS Globals
razorpay
Shortcode Output
[razorpay_payment_buttons][razorpay_subscription_buttons]
FAQ

Frequently Asked Questions about Razorpay Payment Button Plugin