SmartPayLive Security & Risk Analysis

wordpress.org/plugins/smartpaylive

This is the official WooCommerce extension to receive payments using the SmartPayLive payment gateway.

0 active installs v1.0.1 PHP 5.6+ WP 4.4+ Updated Unknown
instant-eftinternet-bankingpayment-gatewaysouth-africawoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SmartPayLive Safe to Use in 2026?

Generally Safe

Score 100/100

SmartPayLive has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The smartpaylive plugin v1.0.1 exhibits a generally strong security posture based on the provided static analysis. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events with security checks is a positive sign, indicating a limited attack surface that is also properly secured at the entry point level. Furthermore, the code demonstrates good practices in its handling of SQL queries, with 100% utilizing prepared statements, and proper output escaping for all identified outputs. The file operation and external HTTP request are isolated, and the lack of reported vulnerabilities historically suggests a mature and well-maintained codebase.

However, there are a few areas that warrant attention. The presence of two flows with unsanitized paths in the taint analysis, even without a critical or high severity rating, represents a potential weakness. While not currently exploited, these could become points of vulnerability if the plugin's functionality evolves or if external input is not strictly controlled. The complete absence of nonce checks and capability checks across all entry points, while currently moot due to the zero entry points, indicates a potential for future security gaps if new entry points are introduced without these essential WordPress security mechanisms. Overall, the plugin is well-built with secure core practices, but the taint analysis findings and the lack of built-in authorization checks on potential future entry points suggest a need for continued vigilance.

Key Concerns

  • Flows with unsanitized paths (2)
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

SmartPayLive Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SmartPayLive Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped12 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
wc_callback (includes\class-wc-gateway-smartpaylive.php:262)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

SmartPayLive Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterwoocommerce_payment_gatewayssmartpaylive.php:26
actionplugins_loadedsmartpaylive.php:34
Maintenance & Trust

SmartPayLive Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedUnknown
PHP min version5.6
Downloads807

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

SmartPayLive Developer Profile

Overflow Business Holdings

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SmartPayLive

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/smartpaylive/assets/js/smartpaylive.js/wp-content/plugins/smartpaylive/assets/css/smartpaylive.css
Script Paths
/wp-content/plugins/smartpaylive/assets/js/smartpaylive.js
Version Parameters
smartpaylive/assets/css/smartpaylive.css?ver=smartpaylive/assets/js/smartpaylive.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about SmartPayLive