SimplePay WooCommerce Security & Risk Analysis

wordpress.org/plugins/simplepay

Este plugin te permite integrar SimplePay para que tu tienda de WooCommerce pueda aceptar todo tipo de pagos chilenos. Wbpay Plus, Webpay One Click, …

0 active installs v0.1.4 PHP 7.0+ WP 4.6+ Updated Feb 11, 2018
chauchaschilesimplepaytransbankwebpay
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SimplePay WooCommerce Safe to Use in 2026?

Generally Safe

Score 85/100

SimplePay WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "simplepay" plugin v0.1.4 exhibits a mixed security posture. On the positive side, it has no known CVEs, a lack of file operations, external HTTP requests, and SQL queries are all prepared. The attack surface, as reported by static analysis, is zero, which is an excellent sign for security. However, there are significant concerns regarding output escaping. With 14 outputs and 0% properly escaped, this indicates a high risk of cross-site scripting (XSS) vulnerabilities. Taint analysis also reveals two flows with unsanitized paths, further reinforcing the XSS risk. The absence of nonce and capability checks, combined with the lack of auth checks on AJAX handlers (though none are reported), suggests that even if entry points were present, they might not be adequately protected against unauthorized actions.

The plugin's vulnerability history is clean, which is a positive indicator of past development practices. However, this does not mitigate the current risks identified in the static analysis. The zero attack surface is a significant strength, but it is overshadowed by the critical issue of unescaped output and unsanitized paths. The bundled Guzzle library, while not explicitly flagged as outdated, should be monitored as bundled libraries can become a vector for vulnerabilities if not kept up-to-date. In conclusion, while the plugin has a clean vulnerability history and no apparent SQL injection or direct file manipulation risks, the severe lack of output escaping and unsanitized paths presents a substantial security risk that needs immediate attention.

Key Concerns

  • Unescaped output: 14 total outputs, 0% properly escaped
  • Taint analysis: 2 flows with unsanitized paths
  • Missing nonce checks: 0
  • Missing capability checks: 0
  • Bundled library: Guzzle (potential for outdated)
Vulnerabilities
None known

SimplePay WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SimplePay WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Guzzle

Output Escaping

0% escaped14 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
process_response (includes\WC_SimplePay_Gateway.php:113)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

SimplePay WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionwoocommerce_api_wc_simplepay_gatewayincludes\WC_SimplePay_Gateway.php:43
actionwoocommerce_api_wc_simplepay_gateway_ipnincludes\WC_SimplePay_Gateway.php:44
actionwoocommerce_thankyouincludes\WC_SimplePay_Gateway.php:45
actionplugins_loadedsimplepay.php:45
filterwoocommerce_payment_gatewayssimplepay.php:52
filterwoocommerce_currenciessimplepay.php:57
filterwoocommerce_currency_symbolsimplepay.php:62
Maintenance & Trust

SimplePay WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedFeb 11, 2018
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

SimplePay WooCommerce Developer Profile

freshwork

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SimplePay WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simplepay/assets/css/simplepay-woocommerce.css/wp-content/plugins/simplepay/assets/js/simplepay-woocommerce.js
Script Paths
/wp-content/plugins/simplepay/assets/js/simplepay-woocommerce.js
Version Parameters
simplepay-woocommerce.css?ver=simplepay-woocommerce.js?ver=

HTML / DOM Fingerprints

CSS Classes
simplepay-thanks
HTML Comments
<!-- SimplePay Thanks -->
JS Globals
simplepay_checkout_params
REST Endpoints
/wp-json/simplepay/v1/transactions
FAQ

Frequently Asked Questions about SimplePay WooCommerce