Robokassa Payment Gateway (Saphali) Security & Risk Analysis

wordpress.org/plugins/robokassa-payment-gateway-saphali

Allows you to use Robokassa payment gateway with the WooCommerce plugin.

100 active installs v1.0.5 PHP + WP 3.0+ Updated Jul 10, 2016
ecommercepayment-getawayrobokassawoo-commercewoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Robokassa Payment Gateway (Saphali) Safe to Use in 2026?

Generally Safe

Score 85/100

Robokassa Payment Gateway (Saphali) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "robokassa-payment-gateway-saphali" v1.0.5 plugin demonstrates a strong security posture in several key areas. The static analysis shows no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface from these common entry points. Furthermore, the plugin avoids dangerous functions, file operations, and external HTTP requests, which are frequent sources of vulnerabilities. All SQL queries are properly prepared, and there are no recorded vulnerabilities in its history. This indicates a careful and security-conscious development approach.

However, there are areas for concern. The taint analysis reveals 3 flows with unsanitized paths, which, while not currently classified as critical or high severity, represent potential risks. The output escaping is also only 56% proper, meaning a significant portion of outputs are not being adequately sanitized. This could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is displayed without proper escaping. Additionally, the complete absence of nonce and capability checks across all potential entry points (even though the attack surface is currently zero) signifies a lack of defensive depth. If new entry points were introduced or if an existing one was overlooked, these would be immediately unprotected.

In conclusion, the plugin benefits from a limited attack surface and secure SQL practices. The lack of a vulnerability history is also a positive sign. The primary risks stem from the identified unsanitized taint flows and the insufficient output escaping. The absence of nonce and capability checks, while not immediately exploitable given the current static analysis, represents a latent risk. Addressing the taint flows and improving output escaping should be the priority for enhancing the plugin's security.

Key Concerns

  • Flows with unsanitized paths detected
  • Output escaping less than 75%
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Robokassa Payment Gateway (Saphali) Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Robokassa Payment Gateway (Saphali) Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

56% escaped9 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
woocommerce_robokassa (wc-robokassa.php:22)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Robokassa Payment Gateway (Saphali) Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionplugins_loadedwc-robokassa.php:20
filterwoocommerce_valid_order_statuses_for_paymentwc-robokassa.php:29
actionvalid-robokassa-standard-ipn-requeswc-robokassa.php:68
filterwoocommerce_payment_gatewayswc-robokassa.php:386
Maintenance & Trust

Robokassa Payment Gateway (Saphali) Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJul 10, 2016
PHP min version
Downloads13K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Robokassa Payment Gateway (Saphali) Developer Profile

Saphali

3 plugins · 10K total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
91 days
View full developer profile
Detection Fingerprints

How We Detect Robokassa Payment Gateway (Saphali)

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/robokassa-payment-gateway-saphali/robokassa.png

HTML / DOM Fingerprints

REST Endpoints
/wp-json/wc/v1/robokassa
FAQ

Frequently Asked Questions about Robokassa Payment Gateway (Saphali)