TopUp Security & Risk Analysis

wordpress.org/plugins/topup-africa-widget

Easy recharge for everyone! - TopUp Africa.

10 active installs v1.0 PHP + WP 3.2+ Updated Jul 14, 2016
abujaafricaairtelairtimebillingcredit
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is TopUp Safe to Use in 2026?

Generally Safe

Score 85/100

TopUp has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "topup-africa-widget" v1.0 plugin exhibits a mixed security posture. On the positive side, the plugin has no known vulnerabilities (CVEs) and a remarkably small attack surface with zero AJAX handlers, REST API routes, shortcodes, or cron events identified. Furthermore, all SQL queries are properly prepared, mitigating the risk of SQL injection. However, significant concerns arise from the code signals. A concerning 0% of output is properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities when data is displayed to users. The presence of two taint flows with unsanitized paths, even without critical or high severity identified, suggests potential avenues for data manipulation or unexpected behavior if user-supplied data is not handled carefully. The absence of nonce checks and capability checks on any potential entry points, although the attack surface is currently zero, leaves the plugin exposed if new entry points are added without proper security measures. The file operations and external HTTP requests, while not inherently insecure without further context, warrant attention given the lack of other robust security checks.

Key Concerns

  • Output escaping is 0% proper
  • Taint flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

TopUp Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

TopUp Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

TopUp Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
7
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
topup_update_options (topupwidget.php:49)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

TopUp Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menutopupwidget.php:28
actionwp_headtopupwidget.php:29
Maintenance & Trust

TopUp Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJul 14, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

TopUp Developer Profile

topupafrica

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect TopUp

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/topup-africa-widget/topupwidget.php

HTML / DOM Fingerprints

Data Attributes
name="login"name="time"
JS Globals
topup_getWidget
FAQ

Frequently Asked Questions about TopUp