Razorpay Subscriptions for WooCommerce Security & Risk Analysis

wordpress.org/plugins/razorpay-subscriptions-for-woocommerce

Allows you to use Razorpay payment gateway with the WooCommerce Subscriptions plugin. This requires Subscriptions feature to be enabled for your accou …

600 active installs v2.4.1 PHP 5.6.0+ WP 3.9.2+ Updated Aug 13, 2024
ecommerceindiapaymentsrazorpaywoocommerce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Razorpay Subscriptions for WooCommerce Safe to Use in 2026?

Generally Safe

Score 92/100

Razorpay Subscriptions for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The static analysis of razorpay-subscriptions-for-woocommerce v2.4.1 indicates a generally good security posture concerning direct code vulnerabilities. The plugin reports zero AJAX handlers, REST API routes, shortcodes, or cron events, which significantly minimizes its attack surface. Furthermore, there are no reported dangerous functions or external HTTP requests, and all identified SQL queries are properly prepared. The absence of known CVEs and past vulnerabilities further reinforces this positive outlook.

However, a significant concern arises from the output escaping analysis, where 100% of the identified outputs are not properly escaped. This represents a substantial risk, as it could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is rendered directly in the output without sanitization. The lack of nonce and capability checks also presents a potential weakness, especially if any interactions with the plugin were to be discovered that bypass the limited attack surface. While the current data suggests a low immediate risk due to the limited entry points, the unescaped output is a critical area that requires immediate attention.

In conclusion, the plugin demonstrates strengths in minimizing its attack surface and secure database interaction. Nevertheless, the pervasive lack of output escaping is a serious flaw that negates many of these strengths and exposes users to potential XSS attacks. The vulnerability history is clean, which is a positive indicator of the developers' security efforts, but the current code analysis reveals a critical oversight.

Key Concerns

  • Unescaped output found
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Razorpay Subscriptions for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Razorpay Subscriptions for WooCommerce Release Timeline

v2.4.1Current
v2.4.0
v2.3.9
v2.3.8
v2.3.7
v2.3.6
v2.3.5
v2.3.4
v2.3.3
v2.3.2
v2.3.1
v2.3.0
v2.2.2
v2.2.1
v2.2.0
v2.1.0
v2.0.0
v1.0.1
v1.0.0
Code Analysis
Analyzed Mar 16, 2026

Razorpay Subscriptions for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Razorpay Subscriptions for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actionplugins_loadedrazorpay-subscriptions.php:45
actionadmin_post_nopriv_rzp_wc_webhookrazorpay-subscriptions.php:46
actionbefore_woocommerce_initrazorpay-subscriptions.php:51
actionwoocommerce_blocks_loadedrazorpay-subscriptions.php:58
actionwoocommerce_blocks_payment_method_type_registrationrazorpay-subscriptions.php:66
actionwoocommerce_subscription_status_cancelledrazorpay-subscriptions.php:179
actionwoocommerce_subscription_status_pending-cancelrazorpay-subscriptions.php:180
actionwoocommerce_subscription_status_on-holdrazorpay-subscriptions.php:181
actionwoocommerce_subscription_status_on-hold_to_activerazorpay-subscriptions.php:182
filterwoocommerce_available_payment_gatewaysrazorpay-subscriptions.php:185
filterwoocommerce_payment_gatewaysrazorpay-subscriptions.php:464
Maintenance & Trust

Razorpay Subscriptions for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedAug 13, 2024
PHP min version5.6.0
Downloads19K

Community Trust

Rating66/100
Number of ratings6
Active installs600
Developer Profile

Razorpay Subscriptions for WooCommerce Developer Profile

Razorpay

10 plugins · 107K total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
22 days
View full developer profile
Detection Fingerprints

How We Detect Razorpay Subscriptions for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/razorpay-subscriptions-for-woocommerce/assets/css/razorpay-subscription-admin.css/wp-content/plugins/razorpay-subscriptions-for-woocommerce/assets/js/razorpay-subscription-admin.js/wp-content/plugins/razorpay-subscriptions-for-woocommerce/assets/js/razorpay-checkout.js/wp-content/plugins/razorpay-subscriptions-for-woocommerce/images/logo.png
Script Paths
/wp-content/plugins/razorpay-subscriptions-for-woocommerce/assets/js/razorpay-subscription-admin.js/wp-content/plugins/razorpay-subscriptions-for-woocommerce/assets/js/razorpay-checkout.js
Version Parameters
/wp-content/plugins/razorpay-subscriptions-for-woocommerce/assets/css/razorpay-subscription-admin.css?ver=/wp-content/plugins/razorpay-subscriptions-for-woocommerce/assets/js/razorpay-subscription-admin.js?ver=/wp-content/plugins/razorpay-subscriptions-for-woocommerce/assets/js/razorpay-checkout.js?ver=

HTML / DOM Fingerprints

CSS Classes
razorpay-subscription-admin
HTML Comments
<!-- The icon should be displayed by the parent plugin, but if it is not, then we will display it -->
Data Attributes
data-razorpay-order-iddata-razorpay-amountdata-razorpay-currencydata-razorpay-keydata-razorpay-descriptiondata-razorpay-name+8 more
JS Globals
RZP_CONFIG
FAQ

Frequently Asked Questions about Razorpay Subscriptions for WooCommerce