
Robokassa Payment Gateway (Saphali) Security & Risk Analysis
wordpress.org/plugins/robokassa-payment-gateway-saphaliAllows you to use Robokassa payment gateway with the WooCommerce plugin.
Is Robokassa Payment Gateway (Saphali) Safe to Use in 2026?
Generally Safe
Score 85/100Robokassa Payment Gateway (Saphali) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "robokassa-payment-gateway-saphali" v1.0.5 plugin demonstrates a strong security posture in several key areas. The static analysis shows no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface from these common entry points. Furthermore, the plugin avoids dangerous functions, file operations, and external HTTP requests, which are frequent sources of vulnerabilities. All SQL queries are properly prepared, and there are no recorded vulnerabilities in its history. This indicates a careful and security-conscious development approach.
However, there are areas for concern. The taint analysis reveals 3 flows with unsanitized paths, which, while not currently classified as critical or high severity, represent potential risks. The output escaping is also only 56% proper, meaning a significant portion of outputs are not being adequately sanitized. This could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is displayed without proper escaping. Additionally, the complete absence of nonce and capability checks across all potential entry points (even though the attack surface is currently zero) signifies a lack of defensive depth. If new entry points were introduced or if an existing one was overlooked, these would be immediately unprotected.
In conclusion, the plugin benefits from a limited attack surface and secure SQL practices. The lack of a vulnerability history is also a positive sign. The primary risks stem from the identified unsanitized taint flows and the insufficient output escaping. The absence of nonce and capability checks, while not immediately exploitable given the current static analysis, represents a latent risk. Addressing the taint flows and improving output escaping should be the priority for enhancing the plugin's security.
Key Concerns
- Flows with unsanitized paths detected
- Output escaping less than 75%
- No nonce checks
- No capability checks
Robokassa Payment Gateway (Saphali) Security Vulnerabilities
Robokassa Payment Gateway (Saphali) Code Analysis
Output Escaping
Data Flow Analysis
Robokassa Payment Gateway (Saphali) Attack Surface
WordPress Hooks 4
Maintenance & Trust
Robokassa Payment Gateway (Saphali) Maintenance & Trust
Maintenance Signals
Community Trust
Robokassa Payment Gateway (Saphali) Alternatives
Robokassa for WooCommerce
robokassa-for-woocommerce
Allows you to use Robokassa payment gateway with the WooCommerce plugin.
Robokassa payment gateway for Woocommerce
robokassa
Позволяет использовать интерфейс (платежный шлюз) для оплаты через Робокассу в WooCommerce. Поддерживает интеграцию чеков (закон 54-ФЗ)
Social Shop for WooCommerce
facebook-shop-by-storeyacom
This plugin will import your Woocommerce store to Facebook in a couple of minutes, with no development or design skills required.
Shipping Additional Days for WooCommerce
woo-shipping-additional-days
Allows you to set additional days to your delivery date into Products and Shipping Classes.
Webmoney – payment gateway for WooCommerce
wc-webmoney
Allows you to use the Webmoney with WooCommerce as a payment gateway plugin.
Robokassa Payment Gateway (Saphali) Developer Profile
3 plugins · 10K total installs
How We Detect Robokassa Payment Gateway (Saphali)
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/robokassa-payment-gateway-saphali/robokassa.pngHTML / DOM Fingerprints
/wp-json/wc/v1/robokassa