Razorpay Payment Button for Visual Composer Security & Risk Analysis

wordpress.org/plugins/razorpay-payment-button-for-visual-composer

Start accepting payments on pages or blogs built on Visual Composer Website Builder. Offer credit/debit cards, UPI, wallets and more in less than five …

0 active installs v1.0.3 PHP + WP + Updated Mar 25, 2025
donate-buttonpayment-gatewaypayment-pluginpayment-buttonupi-credit-debit-card
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Razorpay Payment Button for Visual Composer Safe to Use in 2026?

Generally Safe

Score 92/100

Razorpay Payment Button for Visual Composer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin "razorpay-payment-button-for-visual-composer" v1.0.3 exhibits a generally strong security posture based on the provided static analysis. The absence of critical signals like dangerous functions, raw SQL queries, and external HTTP requests is a positive indicator. Furthermore, the plugin demonstrates good practices in output escaping, with a high percentage of outputs being properly escaped. The lack of any recorded vulnerabilities in its history also suggests a history of security consciousness by the developers.

However, there are specific concerns that temper this otherwise positive assessment. The taint analysis revealed four flows with unsanitized paths, which, although not classified as critical or high severity, represent potential weaknesses. These flows, even without explicit exploit examples in the data, indicate areas where user-supplied data might not be handled with sufficient sanitization before being used internally. The absence of any nonce checks or capability checks across all entry points is a significant concern, as it implies that these entry points, if they were to exist and be exploitable, would be entirely unprotected against unauthorized access or manipulation.

In conclusion, while the plugin benefits from good output sanitization and a clean vulnerability history, the presence of unsanitized paths in taint analysis and the complete lack of authentication and authorization checks on its (albeit currently non-existent) entry points are notable weaknesses. Developers should prioritize addressing these areas to further enhance the plugin's security.

Key Concerns

  • Unsanitized paths in taint analysis
  • No nonce checks on entry points
  • No capability checks on entry points
  • Moderate unescaped output
Vulnerabilities
None known

Razorpay Payment Button for Visual Composer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Razorpay Payment Button for Visual Composer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
31 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

82% escaped38 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
process (includes\rzp-btn-action.php:22)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Razorpay Payment Button for Visual Composer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initincludes\rzp-btn-settings.php:10
actionadmin_enqueue_scriptsindex.php:28
actionadmin_post_rzp_btn_visual_composer_actionindex.php:29
actionadmin_menuindex.php:72
actionvcv:apiindex.php:188
Maintenance & Trust

Razorpay Payment Button for Visual Composer Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedMar 25, 2025
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Razorpay Payment Button for Visual Composer Developer Profile

Razorpay

10 plugins · 107K total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
22 days
View full developer profile
Detection Fingerprints

How We Detect Razorpay Payment Button for Visual Composer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/razorpay-payment-button-for-visual-composer/public/css/bootstrap.min.css/wp-content/plugins/razorpay-payment-button-for-visual-composer/public/css/button.css

HTML / DOM Fingerprints

CSS Classes
rzp-button-settingsrazorpay-form-input
Data Attributes
data-razorpay-key
JS Globals
rzp_init_payment_button
Shortcode Output
[rzp_payment_button][rzp_subscription_button]
FAQ

Frequently Asked Questions about Razorpay Payment Button for Visual Composer