
SagePay Direct Gateway for Easy Digital Downloads Security & Risk Analysis
wordpress.org/plugins/sagepay-direct-gateway-for-easy-digital-downloadsSagePay Direct Gateway for accepting payments on your Easy Digital Downloads Store.
Is SagePay Direct Gateway for Easy Digital Downloads Safe to Use in 2026?
Generally Safe
Score 85/100SagePay Direct Gateway for Easy Digital Downloads has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "sagepay-direct-gateway-for-easy-digital-downloads" plugin version 1.0.0 exhibits a strong security posture in several key areas, particularly regarding its limited attack surface and SQL query handling. The absence of AJAX handlers, REST API routes, shortcodes, and cron events suggests a minimal exposure to common attack vectors. Furthermore, all SQL queries are correctly prepared, which is an excellent practice for preventing SQL injection vulnerabilities. The plugin also avoids file operations and does not bundle external libraries, further reducing its potential for introducing vulnerabilities.
However, there are notable areas for improvement. The plugin has a concerning 56% of its output functions that are not properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not sanitized before being displayed. Additionally, the lack of nonce checks and capability checks on any potential entry points (though the static analysis reports zero entry points, this is a significant omission if any were to be added in the future or if the analysis missed something) is a concern, as these are fundamental WordPress security mechanisms for preventing CSRF and unauthorized actions. The plugin also makes external HTTP requests, which, while not inherently a vulnerability, can be a vector for attacks if not handled securely.
The plugin's vulnerability history is remarkably clean, with no recorded CVEs. This indicates a potentially well-maintained codebase or simply a lack of past exploitation, but it does not negate the existing concerns identified in the static analysis. In conclusion, while the plugin demonstrates strengths in its limited attack surface and secure SQL practices, the significant percentage of unescaped output and the absence of essential security checks represent tangible risks that should be addressed to improve its overall security.
Key Concerns
- Unescaped output detected
- Missing nonce checks
- Missing capability checks
SagePay Direct Gateway for Easy Digital Downloads Security Vulnerabilities
SagePay Direct Gateway for Easy Digital Downloads Release Timeline
SagePay Direct Gateway for Easy Digital Downloads Code Analysis
Output Escaping
SagePay Direct Gateway for Easy Digital Downloads Attack Surface
WordPress Hooks 5
Maintenance & Trust
SagePay Direct Gateway for Easy Digital Downloads Maintenance & Trust
Maintenance Signals
Community Trust
SagePay Direct Gateway for Easy Digital Downloads Alternatives
SagePay Form Gateway for Easy Digital Downloads
sagepay-form-gateway-for-easy-digital-downloads
SagePay Form Gateway for accepting payments on your Easy Digital Downloads Store.
SagePay Server Gateway for WooCommerce
sagepay-server-gateway-for-woocommerce
SagePay Server Gateway for accepting payments on your WooCommerce Store.
Accept SagePay Payments Using Contact Form 7
accept-sagepay-payments-using-contact-form-7
SagePay Server Gateway for accepting payments on your Contact Form 7.
Bayarcash For Easy Digital Downloads
bayarcash-for-easy-digital-downloads
Integrate Bayarcash payment solutions with your Easy Digital Downloads store.
SumUp Payment Gateway For WooCommerce
sumup-payment-gateway-for-woocommerce
The SumUp plugin for WooCommerce allows businesses to securely process payments online. Accept payments from customers using a range of payment method …
SagePay Direct Gateway for Easy Digital Downloads Developer Profile
10 plugins · 390 total installs
How We Detect SagePay Direct Gateway for Easy Digital Downloads
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
edd-labeledd-descriptionedd-selectedd-required-indicatorname="card_type"class="edd-select required"<p id="edd-card-type-wrap">